study set 1 Flashcards

learn it

1
Q

What are the 4 codes of Ethics?

A
  1. Protect the Society, commonwealth and the infrastructure
  2. Act Honorably, honestly, justly, responsibly, and legally
  3. Provide Diligent and competent Service to principals
  4. Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Known as a Program Policy

A

Organizational security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISO 27002

A

Provides practical Advice for HOW TO implement Security controls, use 10 domain to Address ISMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 27005

A

Approach To Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are The Risk control Frameworks?

A
  1. COSO
  2. COBIT
  3. ISO 27001
  4. NIST 800_53 (government agencies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Long term focus on sustaining Operation of the business following a Disaster

A

Business Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of policy is Mandatory with High level statements that supports strategic Goals of the Organization.

A

Organizational security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Risk Methodologies that focuses on IT Systems not the Organizational Strategy

A

NIST SP 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system meets the requirements of the Data Owner is called?

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A dollar figure that represents what the asset is worth to the organization

A

(AV) Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ITADA

A

Identity Theft and Assumption Deterrence Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ECPA

A

Electronic communication Privacy Act

Restricts Governments of interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISO

A

Chief Info Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCI

A

Sensitive Compartmented Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which standard comes from ISACA?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Responding to a Risk is called?

A

Risk Mitigation

18
Q

The Key items in privacy protection for DATA Processors are?

A

Training and Auditing

19
Q

To identify Assets, threats and vulnerabilities

A

Risk Assessment

20
Q

The 7 phases of BCP

A
  1. Project Initiation
  2. Business Impact Analysis
  3. Recovery Strategy
  4. Plan Design and Development
  5. Implementation
  6. Testing
  7. Maintenance
21
Q

Will help you decide the correct risk mitigation Strategy?

A

Cost / Benefit Analysis

22
Q

ISO 27004

A

Metrics

23
Q

TCO

A

Total cost of Ownership
The total cost of implementing a safeguard.
includes maintenance fees

24
Q

Ensures that the state holders needs conditions and options are evaluated.

A

Governance

25
Q

How long is a trademark?

A

10 years

26
Q

What are the Steps in Risk Management?

A
  1. Risk Assessment
  2. Risk Analysis
  3. Risk Mitigation
  4. Risk Monitoring
27
Q

ESI

A

Electronically Stored information

28
Q

Instance of a compromise

A

Exploit

29
Q

System specific policy

A

Is Geared towards use of networks, systems, and approved software lists

30
Q

A Risk assessment that use Qualitative analysis to calculate An Risk value

A

FRAP?

31
Q

Vertical Control and Horizontal Control are?

A

(SCI) Sensitive Compartmented Information Government

32
Q

Determining which portions of the a standard an organization will use?

A

Scoping

33
Q

Who handles the Day to Day Data Governance

A

Data Steward

34
Q

The 3 Risk Methodologies?

A
  1. Octave
  2. Frap
  3. NIST 800-30
35
Q

What process finds trust boundaries and data flow paths?

A

Reduction Analysis

36
Q

ISO 27001

A

Establishment Implementation of controls and improvements of ISMS.

Follow the PDCA

37
Q

What are the 9 steps in NIST 800-30

A
  1. System characterization
  2. Threat Identification
  3. Vulnerability Identification
  4. Control Analysis
  5. Likelihood Determination
  6. Impact Analysis
  7. Risk Determination
  8. Control Recommendations
  9. Results Documentation
38
Q

A Scheme for classifying Data with Categories?

A

Taxonomy

HR, Executives, union, ETC…

39
Q

An analysts to identify assets and their criticality, identify Vulnerabilities and threats and base the protection strategy to reduce Risk

A

OCTAVE

40
Q

What are the 7 steps to implement a Classification Scheme?

A
  1. Identity Custodian
  2. Specify Evaluation Criteria
  3. Classify and Label each Resource
  4. Document Exceptions
  5. Select Security Controls
  6. Specify declassification Procedures
  7. create Awareness Program