Memorization Flashcards

1
Q

Data Lifecycle

A
  1. Create - classify
  2. Store
  3. Use
  4. Share
  5. Archive
  6. Destroy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Manage Data Life Cycle

A
  1. Collection
  2. Location
  3. Maintenance
  4. Retention
  5. Remance
  6. Destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Kill Chain

A

Reconnaissance
Weaponization
Delivery
Exploit
Installation
Command & Control
Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident Response

A

Preparation
Detection
Response
Mitigation / Containment
Reporting
Recovery
Remediation
Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software Delivery Life Cycle

A

Initiation
Requirements
Architecture / Design
Development
Testing
Release / Deployment
Operation
Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Criteria Evaluation Assurance Levels

A

Greatest to least assurance.

7 - Formally verified, designed, and tested
6 - Semi-formally verified, designed, and tested
5 - Semi-formally designed and tested
4 - Methodically designed, tested, and reviewed
3 - Methodically tested and checked
2 - Structurally tested
1 - Functionally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISC2 Code of Ethics Canons

A
  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Act honourably, honestly, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISC2 Code of Ethics Canons

A
  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Act honourably, honestly, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk assessment or risk analysis

A

The examination of an environment for risks, evaluating each threat event as to its likelihood of occurring and the severity of the damage it would cause if it did occur, and assessing the cost of various countermeasures for each risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk response

A

Evaluating countermeasures, safeguards, and security controls using a cost/benefit analysis; adjusting findings based on other conditions, concerns, priorities, and resources; and providing a proposal of response options in a report to senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single Loss Expectancy (SLE)

A

SLE = Asset Value (AV) * Exposure Factor (EF)

SLE = $ * %

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Annualized Loss Expectancy (ALE)

A

ALE = Single Loss Expectancy (SLE) * annualized rate of occurrence (ARO)

or

ALE = AV * EF * ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cost / Benefit Equation

A

[ALE pre-safeguard – ALE post-safeguard] – annual cost of safeguard (ACS) = value of the safeguard to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Management Framework

A

Prepare
Categorize
Select
Implement
Assess
Authorize
Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STRIDE

A

Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service (DoS)
Elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process for Attach Simulation and Threat Analysis (PASTA)

A

Stage I: Definition of the Objectives (DO)
Stage II: Definition of the Technical Scope (DTS)
Stage III: Application Decomposition and Analysis (ADA)
Stage IV: Threat Analysis (TA)
Stage V: Weakness and Vulnerability Analysis (WVA)
Stage VI: Attack Modeling & Simulation (AMS)
Stage VII: Risk Analysis & Management (RAM)

17
Q
A