- Which three (3) of these obligations are part of the 5 key GDPR obligations? Testing
- What year did the European Union start enforcing GDPR? 2018
- Which three (3) of these obligations are part of the 5 key GDPR obligations? Rights of EU Data Subject Consent Accountability of Compliance
- Which is the foundational principle that everyone will get during a SOC audit? Security
- The HIPAA security rule requires covered entites to maintain which two (2) reasonable safeguards for protecting e-PHI? Physical Technical
- HIPAA Administrative safeguards include which two (2) of the following? Security Personnel Workforce Training and Management
- PCI includes 264 requirements grouped under how many main requirements? 12
- If you are a mature organization, which CIS Controls Implementation Group would you use? Implementation Group 3
- A security attack is defined as which of the following? An event that has been identified by correlation and analytics tools as a malicious activity.
- Which order does a typical compliance process follow? Readiness assessment, establish scope, gap remediation, testing/auditing, management reporting
- Under GDPR, who determines the purpose and means of processing of personal data? Controller
- Under the International Organization for Standardization (ISO), which standard focuses on Privacy? ISO 27018
- Which SOC report is closest to an ISO report? Type 1
- What is an auditor looking for when they test the control for implementation over an entire offering with no gaps? Completeness
- The HIPAA Security Rule requires covered entities to maintain which three (3) reasonable safeguards for protecting e-PHI? Technical Physical administrative
- HIPAA Administrative safeguards include which two (2) of the following? Security Personnel Workforce training and management
- Who is the governing entity for HIPAA? US Department of Health and Human Services Office of Civil Rights
- HIPAA Physical safeguards include which two (2) of the following? Workstation and Device Security Facility Access and Control
- PCI uses which three (3) of the following Card Holder Data Environment categories to determine scope? Processes Technology People
- One PCI Requirement is using an approved scanning vendor to scan at what frequency? Quarterly
- In which CIS control category will you find Incident Response and Management? Organizational
- Which is NOT an example of a client? e-mail Server
- Which three (3) threat key factors should be considered when looking at an Endpoint Security Solution? threat hunting detection response user education
- Your organization uses Xcitium OpenEDR for endpoint protection and response (EDR). You want to know the number of each type of endpoint device, such as smartphones, tablets, and PCs. You also want to know the number of corporate-owned devices versus personal devices. Where in the Xcitium Enterprise Platform’s cloud manager can you find an overview of this information? Audit pane
- A patch is a set of changes to a computer program or its data designed for which three (3) functions? improve update fix
- Which two types of updates do most organizations patch as soon as possible after testing? Security and Critical
- Which three (3) are common Endpoint attack types? Spear Phishing Whale hunting Ad Network
- Endpoint detection and response includes which three (3) of these key technologies? Continuous monitoring. Zero-day OS updates. Automatic policy creation for endpoints.
- Which common endpoint attack is targeted at supply chain infiltration? Island Hopping
- What two windows security updates do most organizations always patch? critical and important
- How frequent will most organizations distribute patches? Monthly
- Which three (3) objects are typically managed by active directory? Services Volumes Network User
- Which type of group within Active Directory is used to assign permissions to shared resources? Security groups
- Kerberos Authentication provides several benefits including which three (3) of the following? delegated authentication single sign on interoperability
- Which of the nine different kinds of Windows events that can be audited is used to see when someone has shutdown or restarted the computer or when a program tries to do something it does not have permission to do? System events
- True or False: Internal commands are built into the shell program and are shell dependent? True
- Which Linux Run Level shuts down all services when the system is being rebooted? Run Level 6: Reboot
Other Links:
See other websites for quiz:
Check on QUIZLET