13-3 Flashcards

1
Q

MIST SP 800-35 is an overview of information security with 6 phases of the IT security life cycle are defined. these 6 phases include

A
initiation
assessment
solution
implementation
operations
closeout
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIST SP 800-30 rev 1 Guide for Conducting Risk Assestment has 9 steps in i the process

A
change characterization
threat ID
Vulnerability ID
control analysis
likelihood determination
impact analysis
risk determination
control recommendations
result documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ is the unified information framework for the entire federal goverment that Is replacingthe legacy DIACAP within the federal agencies.

A

risk management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this was a dod procedure for ID, implement, validate, certify and managing IA capabilities and services, expressed as AI controls

A

DIACAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the orange book is a common name of one of several books published by the DOD. because the book is color coded the entire series is referred to as the ____________

A

rainbow series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the full name fo the orang ebok is

A

defense trusted computer system evaluation criteria (DOD-5200.28-STD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the orange book outlines the criteria for rating various OS, but it notoriously difficult to

A

find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this catagory is for any system that does meet the specifications of any other category. any system that fails to receive a higher classification gets a __________

A

D classification / minimal protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

applies to trusted computing bases with optional object protection

A

C Discretionary Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the 2 subcategories of discretionary protection

A

C1 - Discretionary Security Protection

C2 - Controlled Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this is C protection with bit more added to it. this includes

A
DAC
for users at same security level
periodic check of TCB
Username / Password protection
protected Os mode
tested security
documentation for user security, system security and security testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ____ requires users to identify themsaleve to it before beginning to perform any otheractions the TCB is expected to mediate

A

TCB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the 2 subcatagories of mandatory protection

A

b1-Labeled security protection

b2 - structured protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

highly secure mainframe operating system

A

Honeywell Multics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this is a very secure component to network OS. the Verdix Secure LAN is a network component that is capable of interconnecting host systems operating at different ranges of security levels allowing a multilevel secure MLS Lan operation

A

CRYPTEK VSLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this is a very secure UNIX variant

A

trusted xenix