Frameworks, Policies, and Procedures Flashcards

1
Q

Framework-based governance seeks to mitigate the risks that are associated with IT
service delivery

A

Enterprise Security Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A framework that stipulates control selection and deployment

A

Prescriptive Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A component of an ESA framework that is used to assess the formality and
optimization of security control selection and usage and address any gaps

A

Maturity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prescriptive frameworks can make it difficult for the framework to keep pace with
a continually evolving threat landscape

A

Risk-based Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A framework that uses risk assessment to prioritize security control selection and
investment

A

Risk-based Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A risk-based framework that is focused on IT security over IT service provision

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identifies five cybersecurity functions (Identify, Protect, Detect,
Respond, and Recover) and each function can be divided into categories
and subcategories

A

Framework Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assesses how closely core functions are integrated with the
organization’s overall risk management process and each tier is classed
as Partial, Risk Informed, Repeatable, and Adaptive

A

Implementation Tiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to supply statements of current cybersecurity outcomes and
target cybersecurity outcomes to identify investments that will be most
productive in closing the gap in cybersecurity capabilities shown by
comparison of the current and target profiles

A

Framework Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of determining whether a system is free from defects or deficiencie

A

Quality Control (QC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Processes that analyze what constitutes quality and how it can be measured and
checked

A

Quality Assurance (QA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A compliance-testing process to ensure that the security system meets
the requirements of a framework or regulatory environment, or that a
product or system meets its design goals

A

Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of determining whether the security system is fit for
purpose

A

Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of testing the subject against a checklist of requirements in a highly
structured way for measurement against an absolute standard

A

Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A less methodical process of testing that is aimed at examining outcomes or
proving usefulness

A

Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A more rigid process than assessments or evaluations, in which the auditor
compares the organization against a predefined baseline to identify areas that
require remediation

A

Audit

17
Q

Similar to a lessons learned review, except it occurs at a regular interval, such as
quarterly or annually

A

Scheduled Review

18
Q

Process of making small, incremental gains to products and services by identifying
defects and inefficiencies for further refinement

A

Continual Improvement

19
Q

The technique of constantly evaluating an environment for changes so that new
risks may be more quickly detected and business operations improved upon

A

Continuous Monitoring