• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back

IATF document 3.1 lists the following types of attacks

Passive


Active


Close-in


Insider


Distribution

Which one of the following is not one of the five system life cycle planning phases as defined in NIST SP 800-14?


1. Initiation phase
2. Requirements phase
3. Implementation phase
4. Disposal phase

2. requirements phase



IDIOD

Acquisition Cycle phases as given in NIST SP 800-64, "Security Considerations in the Information System Development Life Cycle"?

Mission and business planning, acquisition planning, contract performance, disposal and contract closeout

The IATF document 3.1 stresses that information assurance relies on three critical components. Which one of the following answers correctly lists these components?

People, operations, technology



POT

Risk management, as defined in NIST SP 800-30, comprises which three processes?

Risk assessment, risk mitigation, and evaluation and assessment

In the system development life cycle (SDLC), or system life cycle as it is sometimes called, in which one of the of the five phases are the system security features configured, enabled, tested, and verified?

1. Operation/maintenance
2. Development/acquisition
3. Implementation
4. Initiation

Implementation

Which one of he following activities is performed in the Development/Acquisition phase of the SDLC?


1. The scope of the IT system is documented.
2. The IT system is developed, programmed, or otherwise constructed.
3. The system performs its function.
4. Information, hardware, or software is disposed of.

Answer: b


Answer a refers to the Initiation phase, answer c refers to the Operation/Maintenance phase, and answer d refers to the Disposal phase.

In NIST SP 800-30, risk is defined as a function of which set of the following items?


1. Threat likelihood, vulnerabilities, and impact
2. Threat likelihood, mission, and impact
3. Vulnerabilities, mission and impact
4. Threat likelihood, sensitivity, and impact

Answer: a


Answers b, c, and d are distracters.

The risk assessment methodology described in NIST SP 800-30 comprises nine primary steps. Which one of the following is not one of these steps?

1. System characterization
2. Control analysis
3. Impact analysis
4. Accreditation boundaries

Answer: d


Delineating accreditation boundaries is a subset of system characterization (answer a).

Which one of the following items is not one of the activities of the generic systems engineering (SE) process?

1. Discover needs
2. Define system requirements
3. Obtain accreditation
4. Assess effectiveness

Answer: c


Obtaining accreditation is not one of the SE process activities. The other SE process activities are to design system architecture, develop detailed design, and implement system.

The elements Discover information protection needs, Develop detailed security design, and Assess information protection effectiveness are part of what process?


1. The systems engineering (SE) process
2. The information systems security engineering process (ISSE)
3. The system development life cycle (SDLC)
4. The risk management process

The information systems security engineering process (ISSE)

In the ISSE process, information domains are defined under the Discover Information Protection Needs process. Which one of the following tasks is not associated the information domain?

1. Identify the members of the domain.
2. List the information entities that are under control in the domain.
3. Identify the applicable privileges, roles, rules, and responsibilities of the users in the domain.
4. Map security mechanisms to security design elements in the domain.

Map security mechanisms to security design elements in the domain.



This task is performed under the Develop Detailed Security Design activity.