Asset Security Domain Flashcards

1
Q

Portable USB drives that embed encryption algorithms within the hard drive, thus eliminating the need to install any encryption software

A

Self-Encrypting USB Drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An assessment of quality based on standards external to the process and involves reviewing of the activities and quality control processes to ensure final products meet predetermined standards of quality

A

Quality Assurance (QA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An assessment of quality based on internal standards, processes, and procedures established to control and monitor quality

A

Quality Control (QC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by an known technique

A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Focuses on providing measurements and standards to protect information systems against threats to the confidentiality of information, integrity of information and processes, and availability of information and services in order to build trust and confidence

A

NIST Computer Systems Division (CSD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The US Government repository of publicly available security checklists (or benchmarks) that provide detailed low-level guidance on setting the security configuration of operating systems and applications

A

The National Checklist Program (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software that is used to encrypt otherwise unprotected storage media such as CDs, DVDs, USB drives, or laptop hard drives

A

Media Encryption Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ITAM is a much broader discipline, adding several dimensions of management and involving a much broader base of stakeholders

A

IT Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allows greater flexibility in applying encryption to specific file (s)

A

File Encryption Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The residual physical representation of data that has been in some way erased

A

Data Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The methodology that identifies the path to meet user requirements

A

Data Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ensure important datasets are developed, maintained and accessible within their defined specifications

A

Data Custodians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities

A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The offical series of publications relating to standards and guidelines adopted

A

Federal Information Processing Standards (FIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The critical point where a material’s intrinsic magnetic alignment changes direction

A

Curie Temperature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Represents the outcomes based on business needs that an organization has selected from the Framework Catergories and Subcategories

A

Framework Profile

17
Q

Provide context on how an organization views cybersecurity risk and the processes in place to manage that risk

A

Framework Implementation Tiers

18
Q

A set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors

A

Framework Core

19
Q

Objects, features, or items that are collected, automated or affected by activities or the functions of organizations

A

Data Standards

20
Q

The process of determining the impact of the loss of confidentiality, integrity, or availability of the information to an organization

A

Categorization

21
Q

Entails analyzing the data that the organization retains, determining its importance and value, and then assigning it to a category

A

Data Classification