Objective 1 Flashcards

1
Q

Process of verifying an identity bound to the person asserting it

A

Identification and Authentication Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Act of presenting an identity to a system

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Validation of a claimed identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use of two or more authentication factors

A

multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most common authenticator factor

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardest authentication factor to trick

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Closely related to “something you know” authentication factor

A

Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grants access based upon identity

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Magnetization left behind after information has been removed from a piece of magnetic media

A

Magnetic Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Use of prescribed safeguards and controls taken to prevent reconstruction of magnetic remanence

A

Remanence Security Methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process of eradicating data on media before reused in an environment providing an acceptable level of protection for data

A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of recording new data on top of already stored data thus destroying old data

A

Overwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trained individual (not overwriter) randomly samples 20% of disk

A

Overwrite Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Removes information from media rendering it unrecoverable by technical means

A

Sanitizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process of erasing magnetic media by eliminating any remnant magnetic fields. The preferred method of of sanitizing magnetic media

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Act of physically destroying media making it unusable by no exploitation method

A

Physical Destruction

17
Q

Methods of physical destruction include…?

A

Shredding, burning, crushing, acid wash, breaking, and surface scratching

18
Q

What are the 3D0X2 roles?

A

Prevent accidental disclosure of processed or stored sensitive information, and must be knowledgeable of clearing, sanitizing, and destruction procedures and have tools available

19
Q

Systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation

A

Certification & Accreditation Process

20
Q

AF C&A program is defined in…?

A

AFI 33-210

21
Q

Comprehensive assessment of the management, operational, and technical security controls in an information system

A

Certification

22
Q

Official management decision given by senior agency
official authorizing operation of information system and to explicitly accept risk to agency operations, assets, or individuals

A

Accreditation

23
Q

Non-regulatory federal agency with mission to promote US innovation and industrial competitiveness

A

NIST (National Institute of Standards of Technology)

24
Q

Risk-based approach to selection of security controls

A

NIST RMF (National Institute of Standards of Technology Risk Management Framework)

25
Q

What are the NIST RMF process steps?

A

Categorize, Select, Implement, Assess, Authorize, Monitor

26
Q

Ensures continuity of operations as changes are validated, approved, and implemented

A

Change Management