CCP Lesson 8 Flashcards

1
Q

Access Control (AC) L1-3.1.1

A

Limit information system access to authorized users, processes acting on behalf of authorized users, of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control (AC) L1-3.1.2

A

Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control (AC) L1-3.1.20

A

Verify and control/limit connection to and use of external information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control (AC) L1-3.1.22

A

Control information posted of processed on publicly available information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identification and Authentication (IA) L1-3.5.1

A

Identify information system users, processes acting on behalf of users of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identification and Authentication (IA) L1-3.5.2

A

Authenticate the identities of those users, processes, of devices, as a prerequisite to allowing access to organizational information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Media Protection (MP) L1-3.8.3

A

Sanitize or destroy information system media containing Federal Contract Information before disposal or release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Protection (PE) L1-3.10.1

A

Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Protection (PE) L1-3.10.3

A

Escort visitors and monitor visitor activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Protection (PE) L1-3.10.4

A

Maintan audit logs of physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Protection (PE) L1-3.10.5

A

Control and manage physical access devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System and Communications Protection (SC) L1-3.13.1

A

Monitor, control, and protect organizational communications at the external boundaries and key internal boundaries of the information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System and Communications Protection (SC) L1-3.13.5

A

Implement subnetworks for publicly accessible system components that are physically of logically separated from internal networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System and Information Integrity (SI) L1-3.14.1

A

Identify, Report, and correct information and information system flaws in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System and Information Integrity (SI) L1-3.14.2

A

Provide protection from malicious code at appropriate locations withing organizational information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System and Information Integrity (SI) L1-3.14.4

A

Update malicious code protection mechanisms when new releases are available.

17
Q

System and Information Integrity (SI) L1-3.14.5

A

Perform Periodic scans of the information system and real time scans of files from external sources as files are downloaded, opened, of executed.

18
Q

Level 1 Gap Analysis

A

-Review all practices and their associated Assessment Objectives
.
-Ensure all applicable practices and Assessment Objectives are currently being met.

-Document how the practices and Assessment Objectives are being met.

-Identify additional Evidence that will be used to demonstrate adoption of the practice. x

-The more detailed the Evidence, the more confident the OSC will be in its level 1 self-assessment.