Domain 2 Flashcards

(33 cards)

1
Q

Disclosure of this type of material can cause exceptionally grave damage to national security

A

top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disclosures of this type of material can cause serious damage to national security

A

secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disclosure of this material can cause damage to national security

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is read only memory (ROM) nonvolatile?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ memory is the fastest system memory

A

cached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The fastest portion of the CPU cache is the ___ file

A

register

it contains multiple registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The second fastest form of cache memory is ____

A

level 1 cache, located on the CPU itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ cache is connected to the outside of the CPU

A

Level 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS is stored on ROM or RAM?

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fast expensive memory that uses small latches called ‘flip flops’ to store bits

A

SRAM (static RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stores bits in small capacitors like small batteries and is slow and cheaper than SRAM

A

DRAM (dynamic RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DRAM or SRAM does not require refreshing and maintains integrity as long as power is supplied?

A

DRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ can be written once, typically at factor

A

PROM (programmable read only memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ and ____ may be ‘flashed’ or erased and written multiple times

A

EPROM and EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This device is programmed after it leaves the factory

A

PLD (programmable logic device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flash memory is a type of ___. The difference between ___ is that any byte of EEPROM may be written while flash drives are written by large sectors

17
Q

A ____ is a combination of flash memory (EEPROM) and DRAM

18
Q

True of False

Degaussing data on a SSD has no effect

19
Q

This command improves garbage collection by marking data as ‘invalid’. It helps improve performance

20
Q

The two options for destroying data on a SSD is:

A

ATA Secure Erase and destruction. Destruction is the best for SSDs that are physically damaged

21
Q

True or False

Destroying objects is more secure than overwriting them

22
Q

A data owner’s acceptance of a system certification and residual risk

A

accreditation

23
Q

A RMF from Carnegie Mellon that describes a 3 phase process for managing risk.

phase 1: identifies staff knowledge, assets, and threats

phase 2: identifies vulnerabilities and evaluates safeguards

phase 3: conducts the risk analysis and develops the risk mitigation strategy

A

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)

24
Q

A RMF from Carnegie Mellon that describes a 3 phase process for managing risk.

phase 1: identifies staff knowledge, assets, and threats

phase 2: identifies vulnerabilities and evaluates safeguards

phase 3: conducts the risk analysis and develops the risk mitigation strategy

A

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)

25
A control framework for employing information security governance best practices within an organization
COBIT
26
A framework for providing best practices within an organization
ITIL (Information Technology Infrastructure Library)
27
Process of determining which portions of a standard will be employed by an organization
scoping
28
The process of customizing a standard for an organization
tailoring
29
True of False? End to end encryption provides anoynomity
False
30
True or False Link encryption is weak because data is unencrypted at each node
True
31
state or condition of being free from being observed or disturbed by other people
privacy
32
Cycle that data goes through from creation to destruction
information lifecycle
33
Information lifecycle stages
Creation Store Use Share Archive Destroy