Isc^2 Flashcards

1
Q

An data about an individual that could be used to identify them.

A

PII
Personally a identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information regarding one’s health status

A

PHI
Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Includes trade secrets, research, business plans, and intellectual property

A

Classified Sensitive Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level of importance assigned to information by its owner or the purpose of denoting its need for protection.

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something you now

A

Passwords or phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Something you have

A

Tokens, memory cards, smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Something you are

A

Biometrics, measurable characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process to prove the identity of the request or

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection against an individual falsely denying having performed a particular action.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A measure of the extent to which an entity is threatened by a potential circumstance or event

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Something in need of protection

A

ASSET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A gap or weakness in those protection efforts

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Something or someone that aims to exploit a vulnerability to thwart protection efforts.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Taking no action to reduce the likelihood of a risk occurring

A

Risk Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Decision to attempt to eliminate the risk entirely

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Prevent or reduce the possibility of a risk event or it’s impact

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Passing the risk onto another party

A

Risk Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A method of risk analysis that is based on the assignment of a descriptor such as low medium or high

A

Qualitative Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A method of risk analysis where numerical values are assigned to both impact and likelihood based on statistical probabilities and monetarized valuation of loss or gain.

A

Quantitative Risk Analysis

20
Q

Pertain to the physical, technical, and administrative mechanism that act as safeguards or countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and it’s information.

A

Security Controls

21
Q

Address process based security needs using physical hardware devices such as badge readers, features on buildings and facilities,

A

Physical Controls

22
Q

Security controls that systems and networks directly implement. Provide automated protection from unauthorized access and misuse and facilitate detection of security violations and support.

A

Technical Controls

23
Q

Are directives, guidelines, or advisories aimed at the people within the organization. Provide framework, constraints and standards for the entire organization.

A

Administrative Controls

24
Q

HIPAA

A

Health insurance portability and accountability act of 1996

Governs the use of PHI in the US

25
Q

GDPR

A

General Data Protection Regulation

Control the use of PII of its citizens in Europe

26
Q

Policies

A

Highest level of governance documents in an organization usually approved and issued by management to support compliance initiatives

27
Q

Procedures help when step by step instructions are needed

A
28
Q

Laws and regulations

A

Are usually mandated by a government agency.

29
Q

Security commensurate with the risk and magnitude of harm resulting from the loss misuse or unauthorized access to or modification of information.

A

Adequate security

30
Q

A documented losers level of security configuration allowed by a standard or organization

A

Baseline

31
Q

Malicious code that acts like a remotely controlled robot or an attacker.

A

Bot

32
Q

Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and level

A

Classified or Sensitive Information

33
Q

A measure of degree to which an organization depends on the information or info system for the success of a mission or biz function

A

Criticality

34
Q

Process of how an organization or managed usually includes all aspects of how decisions are made for that organization such as policies roles procedures.

A

Governance

35
Q

Magnitude of harm that could be used by a threats exercise of a vulnerability

A

Impact

36
Q

Potential adverse impacts to an organizations operation assets, individuals other organization and even the nation.

A

Information Security Risk

37
Q

The internet standards organization made up of network designers operators vendors and researchers that define protocols through standards (IP , TCP, DNS) through process of collaboration and consensus

A

IETF Internet Engineering Task Force

38
Q

Probability that a potential vulnerability may be exercised within the construct of the associated environment

A

Likelihood

39
Q

Weighted factor based on subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities

A

Likelihood of Occurrence

40
Q

Using two or more sustain the instances of of 3 factors of authentication (something you know, something you have, something you are)

A

Multi factor Authentication

41
Q

Apart of the US Department of commerce and addresses the measurement infrastructure within the science and technology efforts within the government.
Sets standards within Computer Security Resource Center of the Computer Security Divisions

A

National Institute of standards and Technology (NIST)

42
Q

The inability to deny taking action such as creating information, approving information and sending or receiving a message.

A

Non-repudiation

43
Q

Any information that can be used to trace a persons individual identity

A

Personally Identifiable Information
PII

44
Q

Controls implemented through a tangible mechanism. Examples include walls, fences, guards, locks etc.

A

Physical controls

45
Q

The right of an individual to control the distribution of the information about themselves

A

Privacy

46
Q

The chances or likelihood that a given vulnerability or a set of vulnerabilities

A

Probability

47
Q

Information regarding health status, the provision of healthcare or payment for healthcare as defined in HIPPA

A

Protected Health Information
PHI