Domain 2 Flashcards

1
Q

Disclosure of this type of material can cause exceptionally grave damage to national security

A

top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disclosures of this type of material can cause serious damage to national security

A

secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disclosure of this material can cause damage to national security

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is read only memory (ROM) nonvolatile?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ memory is the fastest system memory

A

cached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The fastest portion of the CPU cache is the ___ file

A

register

it contains multiple registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The second fastest form of cache memory is ____

A

level 1 cache, located on the CPU itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ cache is connected to the outside of the CPU

A

Level 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BIOS is stored on ROM or RAM?

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fast expensive memory that uses small latches called ‘flip flops’ to store bits

A

SRAM (static RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stores bits in small capacitors like small batteries and is slow and cheaper than SRAM

A

DRAM (dynamic RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DRAM or SRAM does not require refreshing and maintains integrity as long as power is supplied?

A

DRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ can be written once, typically at factor

A

PROM (programmable read only memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ and ____ may be ‘flashed’ or erased and written multiple times

A

EPROM and EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This device is programmed after it leaves the factory

A

PLD (programmable logic device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flash memory is a type of ___. The difference between ___ is that any byte of EEPROM may be written while flash drives are written by large sectors

A

EEPROM

17
Q

A ____ is a combination of flash memory (EEPROM) and DRAM

A

SSD

18
Q

True of False

Degaussing data on a SSD has no effect

A

True

19
Q

This command improves garbage collection by marking data as ‘invalid’. It helps improve performance

A

TRIM

20
Q

The two options for destroying data on a SSD is:

A

ATA Secure Erase and destruction. Destruction is the best for SSDs that are physically damaged

21
Q

True or False

Destroying objects is more secure than overwriting them

A

True

22
Q

A data owner’s acceptance of a system certification and residual risk

A

accreditation

23
Q

A RMF from Carnegie Mellon that describes a 3 phase process for managing risk.

phase 1: identifies staff knowledge, assets, and threats

phase 2: identifies vulnerabilities and evaluates safeguards

phase 3: conducts the risk analysis and develops the risk mitigation strategy

A

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)

24
Q

A RMF from Carnegie Mellon that describes a 3 phase process for managing risk.

phase 1: identifies staff knowledge, assets, and threats

phase 2: identifies vulnerabilities and evaluates safeguards

phase 3: conducts the risk analysis and develops the risk mitigation strategy

A

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)

25
Q

A control framework for employing information security governance best practices within an organization

A

COBIT

26
Q

A framework for providing best practices within an organization

A

ITIL (Information Technology Infrastructure Library)

27
Q

Process of determining which portions of a standard will be employed by an organization

A

scoping

28
Q

The process of customizing a standard for an organization

A

tailoring

29
Q

True of False?

End to end encryption provides anoynomity

A

False

30
Q

True or False

Link encryption is weak because data is unencrypted at each node

A

True

31
Q

state or condition of being free from being observed or disturbed by other people

A

privacy

32
Q

Cycle that data goes through from creation to destruction

A

information lifecycle

33
Q

Information lifecycle stages

A

Creation
Store
Use
Share
Archive
Destroy