Domain 1 set 3 Flashcards

1
Q

What is the most common type of policy?

A

Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for Data Classifications?

A

Data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who handles the Day to Day Data Governance

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Scheme for classifying Data with Categories?

A

Taxonomy

HR, Executives, union, ETC…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Cost of Security of a Risk comes from?

A

Quantitative anaysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aweakness or lack of a safeguard?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 ways to Mitigate Risk?

A
  1. Reduce2. Accept3. Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Governance is the reponsabley of who?

A

upper management (the Board)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which standard comes from ISACA?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How long is a trademark?

A

10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A dollar figure that represents what the asset is worth to the organization

A

(AV) Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are The Risk control Frameworks?

A
  1. COSO
  2. COBIT
  3. ISO 27001
  4. NIST 800_53 (government agencies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of law regulates conduct for company’s

A

Administrative (regulatory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

minimum acceptable security configuration for a system or process

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long is the Strategic plan made for?

A

5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Determining which portions of the a standard an organization will use?

A

Scoping

17
Q

What process finds trust boundaries and data flow paths?

A

Reduction Analysis

18
Q

SCI

A

Sensitive Compartmented Information

19
Q

A security Camera is what type of control?

A

Technical Control

20
Q

Who sets the frame work?

A

upper management (the Board)

21
Q

Types of intellectual property’s

A
  1. trade Secrets
  2. Copyrights
  3. Trademarks
  4. Patents
22
Q

Delphi Technique is part of?

A

Qualitative Risk Analysis

23
Q

Vertical Control and Horizontal Control are?

A

(SCI) Sensitive Compartmented InformationGovernment

24
Q

The 3 Risk Methodologies?

A
  1. Octave
  2. Frap
  3. NIST 800-30
25
Q

A Defaced of a homepage is what part of the IAAA?

A

Integrity

26
Q

What type of policy is Mandatory with High level statements that supports strategic Goals of the Organization.

A

Organizational security Policy

27
Q

ESI

A

Electronically Stored information

28
Q

What are the Steps in Risk Management?

A
  1. Risk Assessment
  2. Risk Analysis
  3. Risk Mitigation
  4. Risk Monitoring
29
Q

Customizing a standard for an organization is called?

A

Tailoring

30
Q

The 3 law types

A
  1. Criminal Law - Jail time
  2. Civil Law - Due Care
  3. Administrative (regulatory) HIPAA
31
Q

IT goals in mind standard?

A

COBIT

32
Q

SLE

A

Single loss Expectancy