super study Flashcards

1
Q

The five key principle that forms the core of the COBIT5 framework?

A

1) Meeting Stakeholders needs,
2) Covering the enterprise end to end,
3) Apply a single integrated framework,
4) Enabling a holistic approach,
5) Separating governance from management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 codes of Ethics Canons?

A
  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Act Honorably, honestly, justly, responsibly, and legally
  3. Provide Diligent and competent Service to principals
  4. Advance and protect the profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The 7 phases of BCP

A
  1. Project Initiation
  2. Business Impact Analysis
  3. Recovery Strategy
  4. Plan Design and Development
  5. Implementation
  6. Testing
  7. Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 Steps in Risk Management?

A
  1. Risk Assessment
  2. Risk Analysis
  3. Risk Mitigation
  4. Risk Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 9 steps in NIST 800-30

A
  1. System characterization
  2. Threat Identification
  3. Vulnerability Identification
  4. Control Analysis
  5. Likelihood Determination
  6. Impact Analysis
  7. Risk Determination
  8. Control Recommendations
  9. Results Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 7 steps to implement a Classification Scheme?

A
  1. Identity Custodian
  2. Specify Evaluation Criteria
  3. Classify and Label each Resource
  4. Document Exceptions
  5. Select Security Controls
  6. Specify declassification Procedures
  7. create Awareness Program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 8 steps to EDRM

A

The Electronic Discovery Reference Model

  1. Identification
  2. Preservation
  3. Collection
  4. processing
  5. review
  6. Analysis
  7. Production
  8. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A privacy Policy needs to cover what 4 items?

A
  1. Collection
  2. Use
  3. Disclosure
  4. Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Code of Ethics Preamble:

A
  1. The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
  2. Therefore, strict adherence to this Code is a condition of certification.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Systems Development life cycle 5 steps:

A
  1. Initiation
  2. Acquisition / Development
  3. implementation
  4. Operation / Maintenance
  5. Disposal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Software Development life cycle 5 steps:

A
  1. Requirements Gathering
  2. Design
  3. Development
  4. Testing / Validation
  5. Release / Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a good Configuration management process is one that can:

A

(1) accommodate change;
(2) accommodate the reuse of proven standards and best practices;
(3) ensure that all requirements remain clear, concise, and valid;
(4) ensure changes, standards, and requirements are communicated promptly and precisely; and
(5) ensure that the results conform to each instance of the product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly