Domain 1 set 3 Flashcards

(32 cards)

1
Q

What is the most common type of policy?

A

Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for Data Classifications?

A

Data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who handles the Day to Day Data Governance

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Scheme for classifying Data with Categories?

A

Taxonomy

HR, Executives, union, ETC…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Cost of Security of a Risk comes from?

A

Quantitative anaysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aweakness or lack of a safeguard?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 ways to Mitigate Risk?

A
  1. Reduce2. Accept3. Transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Governance is the reponsabley of who?

A

upper management (the Board)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which standard comes from ISACA?

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How long is a trademark?

A

10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A dollar figure that represents what the asset is worth to the organization

A

(AV) Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are The Risk control Frameworks?

A
  1. COSO
  2. COBIT
  3. ISO 27001
  4. NIST 800_53 (government agencies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of law regulates conduct for company’s

A

Administrative (regulatory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

minimum acceptable security configuration for a system or process

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long is the Strategic plan made for?

A

5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Determining which portions of the a standard an organization will use?

17
Q

What process finds trust boundaries and data flow paths?

A

Reduction Analysis

18
Q

SCI

A

Sensitive Compartmented Information

19
Q

A security Camera is what type of control?

A

Technical Control

20
Q

Who sets the frame work?

A

upper management (the Board)

21
Q

Types of intellectual property’s

A
  1. trade Secrets
  2. Copyrights
  3. Trademarks
  4. Patents
22
Q

Delphi Technique is part of?

A

Qualitative Risk Analysis

23
Q

Vertical Control and Horizontal Control are?

A

(SCI) Sensitive Compartmented InformationGovernment

24
Q

The 3 Risk Methodologies?

A
  1. Octave
  2. Frap
  3. NIST 800-30
25
A Defaced of a homepage is what part of the IAAA?
Integrity
26
What type of policy is Mandatory with High level statements that supports strategic Goals of the Organization.
Organizational security Policy
27
ESI
Electronically Stored information
28
What are the Steps in Risk Management?
1. Risk Assessment 2. Risk Analysis 3. Risk Mitigation 4. Risk Monitoring
29
Customizing a standard for an organization is called?
Tailoring
30
The 3 law types
1. Criminal Law - Jail time 2. Civil Law - Due Care 3. Administrative (regulatory) HIPAA
31
IT goals in mind standard?
COBIT
32
SLE
Single loss Expectancy