CISSP ch 2 Flashcards

1
Q

IAM

A

identity and access management

Provision the account and assign necessary privileges and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AUP

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UBA

A

User behavior analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UEBA

A

User and entity behavior analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VMS

A

Vendor management system

Software that assists with the management and procurement of staffing services, hardware, software, and other needed products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PCI DSS

A

Payment card industry data security standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FERPA

A

Family educational rights and privacy act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AV

A

Asset value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EF

A

exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk

A

Possibility that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result

Threat x vulnerability

Probability of harm x severity of harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack

A

Intentional attempt to exploit a vulnerability to cause damage, loss or disclosure of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Breach

A

Successful attack

Intrusion, penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ACS

A

Annual cost of safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCA

A

security control assessment

Formal evaluation of a security infrastructure’s individual mechanisms against a baseline or reliability expectation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ERM

A

enterprise risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RMM

A

risk maturity model, 5 levels
Ad hoc, preliminary, defined, integrated, optimized

17
Q

RMM lv 1

A

Ad hoc

Chaotic starting point

18
Q

RMM lv 2

A

Preliminary

Loose attempts to follow risk management processes, each department may perform risk assessment uniquely

19
Q

RMM lv 3

A

Defined

A common or standardized risk framework is adopted org wide

20
Q

RMM lv 4

A

Integrated

Risk management operations are integrated into business processes

Metrics are used to gather effectiveness data

Risk is considered an element in business strategy

21
Q

RMM lv 5

A

Optimized

Focus on achieving objectives rather than just reacting to external threats

Increased strategic planning

Lessons learned are reintegrated into risk management process

22
Q

EOL

A

End of life

23
Q

EOS / EOSL

A

End of support / end of service life

24
Q

RMF

A

NIST risk management framework, 6 cyclical phases

Prepare
Categorize (systems)
Select (controls)
Implement (controls)
Assess (controls)
Authorize (system)
Monitor (system and controls)

25
Q

CSF

A

NIST cyber security framework

26
Q

ISO/IEC 31000

A

Risk management - guidelines

27
Q

OCTAVE

A

Another risk management framework

28
Q

FAIR

A

Another risk management framework

29
Q

TARA

A

Another risk management framework

30
Q

Smishing

A

SMS phishing

31
Q

SPIM

A

Spam over instant messaging

32
Q

Piggybacking

A

Unauthorized entity gains access to a facility by tricking worker into providing consent

33
Q

Typo squatting

A

Capture and redirect traffic when a user mistypes the domain name or IP address of an intended resource

34
Q

BEC

A

Business email compromise

35
Q

SPF

A

Sender policy framework

Anti spam tool

identify the mail servers that are allowed to send email for a given domain

36
Q

DKIM

A

Domain keys identified mail

Anti spam tool

email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.

37
Q

DMARC

A

Domain message authentication reporting and conformance

Anti spam tool

give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.