Domain 1 Flashcards

1
Q

What is the CIA Triad?

A

Confidentiality, Integrity and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Confidentiality?

A

Access Controls - Ensure only Authorized Subjects can access objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Integrity?

A

Ensure that data or system configurations are not modified without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Authorized requests for objects must be granted to subjects within reasonable time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main points of theISC2 Code of Ethics?

A

Protect Society, Act Honourably, Provide diligent and competent service to principles and Advance the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four levels of Security Policy Development?

A

Acceptable use Policy, Security Baselines, Security Guidelines and Security Procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an acceptable use policy?

A

Assigns roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security baseline?

A

Defines “minimum levels” of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are security guidelines?

A

Offer recommendations as to how baselines may be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Procedures

A

Detailed step-by-step guides on how to implement a security mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Risk Categories?

A

1) Damage (physical loss of an asset) 2) Disclosure - Disclosing critical information 3) Losses - permanent or temporary including altered data or inaccessible data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Risk Factors? (Part 1)

A

1) Physical Damage - Natural Disaster, Power loss etc 2) Malfunctions - Failure of systems, networks or peripherals. 3) Attacks - purposeful acts whether inside or outside the org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are more Risk Factors (Part 2)

A

1) Human errors - usually considered accidental
2) Application Errors - Failures of the application, including the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are more Risk Factors (Part 2)

A

1) Human errors - usually considered accidental
2) Application Errors - Failures of the application, including the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly