click below
click below
Normal Size Small Size show me how
CISSP Study
Domain 1 - Security and Risk Management
| Question | Answer |
|---|---|
| Acronym meaning: CIA | Confidentiality, Integrity, & Availability (Careful not to fall for the AIC trick as its sometimes referred to) |
| Acronym meaning: IAAA | Identification, Authentication, Authorization, & Accountability |
| Insures reliability and timely access to data and resources to authorized individuals. | Availability |
| Upheld when the assurance of the accuracy and reliability of information systems is provided and any unauthorized modification is prevented. | Integrity |
| Ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure. | Confidentiality |
| All of the following provide? Redundant Array of Independent Disks (RAID), Clustering, Load Balancing, Redundant data & power lines, Software & data backups, Disk shadowing, Co-location & offsite facilities, Rollback functions, & Failover configs. | Availability |
| All of the following provide? Hashing (data integrity), Configuration MGMT (System Integrity), Change control (Process Integrity), Access Control (Physical & Technical), Software Digital Signing, & Xmission CRC functions | Integrity |
| All of the following provide? Encryption for DAR (Whole disk & DB), Encryption for DIT (IPSec, TLS, PPTP, SSH), & Access Control (Physical & Technical) | Confidentiality |
| A weakness in a system that allows a threat source to compromise its security? | Vulnerability |
| Any potential danger that is associated with the exploitation of a vulnerability? | Threat |
| If the threat is that someone will identify a specific vulnerability and use it against the company or individual, then the entity that takes advantage of a vulnerability is referred to as? | Threat Agent |
| The likelihood of a threat source exploiting a vulnerability and the corresponding business impact is referred to as? | Risk |
| An instance of being exposed to losses is? | Exposure |
| These are put in place to mitigate (reduce) the potential risk? | Control, Countermeasure, or Safeguard (These terms are interchangeable) |
| A threat agent gives rise to? | Threat |
| A threat exploits? | Vulnerability |
| Vulnerability leads to? | Risk |
| Risk can damage an? | Asset |
| Asset damage can cause an? | Exposure |
| An exposure can be counter measured by a? | Safeguard |
| What are the three (3) control types? | Administrative, Technical, & Physical |