ISMS
AWS
Endpoints
Crypto
Hackers
100

What clause in the ISMS requires establishing "context" of the security program? Why is establishing context important? 

Clause 4 - Establishing context helps ensure alignment between business objectives and the security program. 

100

In AWS, what is the instance type that permits file storage? 

S3 Bucket

100

Name 3 MDM solutions. (At least one must work on MAC.)

1) Microsoft Intune

2) Kaseya

3) Airwatch, JAMF (Work on MAC)

100

What is public key encryption? 

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner).

100

What is password spraying?

Password spraying is a type of brute force attack. In this attack, an attacker will brute force logins based on list of usernames with default passwords on the application.

200

When two ISO frameworks are managed jointly, what type of management system is created? 

An Integrated Management System (IMS)

200

In AWS, what is the built-in tool that allows for vulnerability scanning? 

Inspector

200

What is a Golden Image? 

A script used to configure an endpoint to a defined standard. 

200

Describe 3 potential uses of blockchain technology. 

1) Cryptocurrency 

2) P2P/Decentralized Data Storage

3) Identity verification

200

What is OSINT? Provide 2 examples. 

Open Source Intelligence Gathering

1) Searching the dark web for leaked passwords

2) Monitoring social media profiles

300

What are three common flaws in security organizational structures? 

- Security is not independent from IT (e.g., CISO reports to I.T. or is the same person)

- Security does not have a "seat at the table" with executives

- Roles and responsibilities of security duties are unclear (e.g., RACI)

300

In AWS, which tool uses machine learning to look for malicious activity in your AWS environments 

AWS GuardDuty

300
Why would an organization use a VDI? 

An organization may use a virtual desktop to provide a secure location to perform work. The user's physical workstation becomes a window (thin client) to a secure workstation located virtually and tightly controlled by the owner. 

300

What is the latest version of TLS? What version of TLS is considered obsolete? 

TLS 1.3

NSA recommends that only TLS 1.2 or TLS 1.3 be used; and that SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 not be used.

300

What is an APT? Provide two examples. 

Advanced Persistent Threat

ADP 1 - China 

APT 29 - Russia (Cozy Bear)

400

What clause in the ISMS requires documentation of key performance indicators? 

Clause 6.2

400

In AWS, what would you request if you wanted to test access controls? 

AWS IAM Roles and role membership

400

What is the difference between application whitelisting and blacklisting? Which is more secure? 

Whitelist - Only trusted applications can be used. 

Blacklist - All applications are trusted unless explicitly denied. 

400

What is a TLS handshake? 

A TLS handshake enables clients and servers to establish a secure connection and create session keys.

400

Name three Hacker group types (organized groups of hackers). 

1) Hacktivist

2) Nation State

3) Criminal Organizations

500
Describe the purpose and intent of clauses 9.1, 9.2, and 9.3. What audit artifacts should be presented to meet each clause? 

9.1 - Self assessment activities (e.g., compliance calendar events)

9.2 - Internal audit policy, plan, and report

9.3 - Evidence of management review (IRC meeting minutes, responses in the IA report, Risk Register comments) 

500

In AWS, what tool is used for cryptographic key management? 

AWS KMS (Key Management System)

500

What is heuristic analysis? What is an example? 

Heuristic analysis is a method of detecting viruses by examining code for suspicious properties.

Traditional methods of virus detection involve identifying malware by comparing code in a program to the code of known virus types that have already been encountered, analyzed and recorded in a database – known as signature detection.

500
How would quantum computing impact cryptography? 

Quantum computing has such processing power it could theoretically, with time, break any cryptographic key. As a result, cryto keys would likely need to be created using quantum computing and rotation rates would need to be increased. 

500

Name five common attack types. 

Ransomware, Phishing, Stolen Credentials, Social Engineering, DDoS, Password Spraying, Brute Force Attack
M
e
n
u