Domain 1 set 4 Flashcards

1
Q

Known as a Program Policy

A

Organizational security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 9 steps in NIST 800-30

A
  1. System characterization
  2. Threat Identification
  3. Vulnerability Identification
  4. Control Analysis
  5. Likelihood Determination
  6. Impact Analysis
  7. Risk Determination
  8. Control Recommendations
  9. Results Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability

A

Weaknesses in security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The card industry Data security standard

A

PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is a single system Risk assessment?

A

FRAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it called when a data owner accepts the certification?

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copyrights are good for?

A

Life Time Plus 70 years after

Business 95 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who plans, builds, runs and monitors activities in alignment with the direction set .

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is responsible for Data Privacy Requirements?

A

Data Owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privacy Act of 1974

A

applies only to federal Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Residual Risk

A

The amount of risk left over after a risk response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What committee of sponsoring organizations of the treadway commission?

A

COSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Threat

A

An external force that Jeopardizing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Plan is used to bring back business functions?

A

BRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDPR

A

updated EU Law for 2018

17
Q

How long is a Patent?

A

20 years

18
Q

“NEED TO KNOW” is what type of control?

A

Horizontal Control

19
Q

What is the self Directed Rick Evaluation methodology

A

OCTAVE

20
Q

What act is for Identity theft

A

(ITADA) Identity Theft and Assumption Deterrence Act

21
Q

Used to ensure Honest opinions using Anonymous communications

A

Delphi Technique

22
Q

What is Data in use?

A

Data in memory, memory caches and CPU Registers

23
Q

Who monitors the performance?

A

Governance

24
Q

Vertical Control?

A

example Top secret, secret, etc…

25
Q

Not Mandatory policy for best practices

A

Guidelines

26
Q

Proactive Controls are?

A

Safeguards

27
Q

What are the 8 steps to EDRM

A

The Electronic Discovery Reference Model

  1. Identification
  2. Preservation
  3. Collection
  4. processing
  5. review
  6. Analysis
  7. Production
  8. Presentation
28
Q

OEP

A

Occupant Emergency Plan

29
Q

Step by Steps Directives

A

Procedures

30
Q

An username is what part of IAAA?

A

Identification