CISSP-P1 Flashcards
The CIA triad stands for
Confidentiality Integrity Availability
From a CIA perspective “Access Controls help ensure that only authorized subjects can access objects”
Confidentiality
Integrity
Availability
Confidentiality
From a CIA perspective “Ensures that our data or system configurations are not modified without authorization”
Confidentiality
Integrity
Availability
Integrity
From a CIA perspective “Authorized request for objects must be granted to subjects within a reasonable amount of time”
Confidentiality
Integrity
Availability
Availability
The isc2 code of ethics
P.A.P.A
Protect society, the common wealth, the Infrastructure
Act honorably, honestly, justly, responsibly and legally
Provide diligent and competent service to principals
Advance and protect the profession
Out of these four levels of security policy development which one “offers recommendation”
Security procedures
Security guidelines
Security baselines
Acceptable use policy
Security guidelines
Out of these four levels of security policy development which one offers “detailed step by step”
Security procedures
Security guidelines
Security baselines
Acceptable use policy
Security procedures
Out of these four levels of security policy development which one assigns roles and responsibilities”
Security procedures
Security guidelines
Security baselines
Acceptable use policy
Acceptable use policy
Out of these four levels of security policy development which one defines minimum levels”
Security procedures
Security guidelines
Security baselines
Acceptable use policy
Security baselines
In security planning this pan is categorized as a “Midterm plan developed to provide more details on goals of the strategic plan 1 year”
Strategic
Tactical
Operational
Tactical
In security planning this pan is categorized as a “Long Term, stable plan that should include a risk assessment (5 year with annual updates)”
Strategic
Tactical
Operational
Strategic
In security planning this pan is categorized as a “Short term highly detailed plan based on the strategic and tactical plan”
Strategic
Tactical
Operational
Operational
In the Response to risk category which one of these is defined as “Do nothing, and you must accept the risk and potential loss if threat occurs”.
Risk Rejection
Risk deterrence
Risk avoidance
Risk mitigation
Risk assignment
Risk acceptance
Risk acceptance
In the Response to risk category which one of these is defined as “You do this by implementing a countermeasure and accepting the residual risk”.
Risk mitigation
Risk Rejection
Risk deterrence
Risk acceptance
Risk assignment
Risk mitigation
In the Response to risk category which one of these is defined as “Transfer (assign) to a 3rd party , like by purchasing insurance against damage”.
Risk acceptance
Risk avoidance
Risk Rejection
Risk deterrence
Risk mitigation
Risk assignment
Risk assignment
In the Response to risk category which one of these is “when cost of mitigating or accepting are higher than benefits of the service”.
Risk acceptance
Risk mitigation
Risk avoidance
Risk Rejection
Risk assignment
Risk deterrence
Risk avoidance
In the Response to risk category which one of these is “Implementing deterrents to would be violators of security and Policy”.
Risk acceptance
Risk mitigation
Risk avoidance
Risk deterrence
Risk Rejection
Risk assignment
Risk deterrence
In the Response to risk category which one of these is “An unacceptable possible response to risk is to reject risk or ignore risk”.
Risk acceptance
Risk mitigation
Risk avoidance
Risk deterrence
Risk assignment
Risk Rejection
Risk Rejection
The Seven steps of the risk management framework (NIST 800-37)
People - Prepare or Procure?
Can - Classify or Categorize?
See - Select or Sort?
I - influence or Implement
Am - Authorize or assess”
Always - Authorize or assess?
Monitoring- Monitor or Monitor?
Prepare
Categorize
Select
Implement
Assess
Authorize
Monitor
This type of risk is the risk that remains even with all conceivable safeguards in place.
Residual Risk
Inherent Risk
Total Risk
Residual Risk
This type of risk is newly identified risk not yet addressed with risk management strategies, the amount of risk that exist in the absence of controls
Residual Risk
Inherent Risk
Total Risk
Inherent Risk
Types of risk
Residual = after controls implemented
Inherent = Before controls implemented
Total = Without controls
True
False
True
This type of risk is the amount of risk an organization would face if no safe guards were implemented.
Residual Risk
Inherent Risk
Total Risk
Total Risk
Residual = Before controls implemented
Inherent = Without controls
Total = after controls implemented
True
False
False