Domain 2 Flashcards

1
Q

Loss of control, compromise,
unauthorized disclosure, unauthorized
acquisition, or any similar occurrence where a person other than an authorized user
accesses.

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An event that actually or potentially
jeopardizes the confidentiality, integrity,
or availability of an information system.

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any circumstance or event with the
potential to adversely impact organizational
operations (including mission, functions,
image, or reputation)

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reducing the impact of an incident so the
organization can resume the interrupted
operations as soon as possible.

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Preparation
Detection & Analysis
Containment, Eradication & Recovery
Post-Incident Activity

A

Components of an Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Develop a policy approved by management

Identify critical data and systems and any single points of failure

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitor all possible attack vendors

Analyze the incident using known data and threat intelligence

A

Detection and Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gather evidence

Choose an appropriate containment strategy

A

Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify evidence that may need to be retained

Document lessons learned

A

Post-Incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Representative(s) of senior management
Information security professionals
Legal representatives
Public affairs/communications
representatives
Engineering representatives

A

Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Concept that a user should only have access to the resources that they need in order to do their job but no more

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Permissions beyond normal users, such as Administrators, Help Desk/IT Staff and Security Analysts

A

Privileged Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Owner of the resource, typically the creator, has full control to configure which subjects can access the object

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Leverages a central authority that regulates access based on security labels, such as the clearance level that a subject (user) has been approved for, as well the classification of the object

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reduce the likelihood of an outage occurring in the first place (Ex: natural disasters and physical incidents)

A

Preventive Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discover or identify when something bad might have occurred. Like a security camera or a barking dog

A

Detective Controls

17
Q

Provide functionality that serves to communicate expected behavior. A traffic sign like “stop” or “yield”

A

Directive Controls

18
Q

Functionality that fixes a system, process or activity after an adverse event has occurred. Using a fire extinguisher to put out a kitchen fire

A

Corrective Controls