Domain 1 Flashcards

Security Principles

1
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define confidentiality in the CIA Triad.

A

Protecting data from unauthorized access while permitting access to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is integrity in the context of the CIA Triad?

A

Ensuring data is complete, accurate, and consistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main focus of availability in the CIA Triad?

A

Providing timely and reliable access to data for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is privacy?

A

The right of individuals to control their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three common methods of authentication?

A

Something you know (passwords), something you have (tokens), and something you are (biometrics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is non-repudiation?

A

Preventing denial of actions like sending messages or creating information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the four risk treatment options.

A

Avoidance, Acceptance, Mitigation, Transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a risk matrix used for?

A

Prioritizing risks based on likelihood and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the three types of security controls.

A

Physical, Technical, Administrative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of administrative controls?

A

To govern human behavior and decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provide an example of a regulation with international implications.

A

GDPR (General Data Protection Regulation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are procedures in governance?

A

Detailed steps to accomplish tasks, ensuring consistent execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk tolerance?

A

An organization’s appetite for risk, determined by executive management or the board.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define data integrity.

A

Ensuring data has not been altered in an unauthorized manner and is accurate and consistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk transference?

A

Shifting the financial impact of a risk to a third party, such as through insurance.

17
Q

Give an example of a technical control.

A

Firewalls, intrusion detection systems, and access controls.

18
Q

What is the primary goal of risk assessment?

A

To identify, estimate, and prioritize risks to the organization.

19
Q

Explain the term Personally Identifiable Information (PII).

A

Data about an individual that can be used to identify them.

20
Q

Why is availability critical for business operations?

A

Ensures authorized users can access data and systems when needed.

21
Q

What does sensitivity measure in data classification?

A

The importance assigned to information based on its need for protection.

22
Q

Name two examples of administrative controls.

A

Security policies and employee training programs.

23
Q

How is a baseline used in maintaining system integrity?

A

It serves as a reference point to compare the current state and detect changes.

24
Q

What is criticality in the context of availability?

A

The importance an organization assigns to data or systems for its operations.

25
What is the relationship between laws and policies?
Laws inform policies, which guide organizational compliance and behavior.
26
Define risk mitigation.
Actions taken to prevent or reduce the likelihood or impact of a risk.
27
What is a common best practice for authentication?
Use multi-factor authentication (MFA) with at least two factors from the three categories.
28
What is the order in governance elements
Regulations, Stardards, policies, procedures