Secure Operations Plan
Support Secure Operations
Participate in Change Management
Participate in Disposal
Standards
100

A business continuity plan for organizations.  A predetermined set of instructions and procedures that describe how the organizations' business-essential functions will be sustained within 12 hours and up to 30 days.

COOP

100

The actions taken to render data written on media unrecoverable by both ordinary and extraordinary means.

Media Sanitization
100

An update/fix for an IT asset.

Patch

100

The removal of sensitive data from storage devices in such a way that there is assurance the data may not be reconstructed using normal system functions or software recovery utilities

Clear

100

The analysis conducted by an organizational official to determine the extent to which changes to systems have affected the security state of the system

Security Impact Analysis

200

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyberattack.

IRP (Incident Response Plan)

200

A process to render access to target data on the media infeasible for a givel level of effort.

Sanitize

200

Hardware configuration changes can improve overall system security, however, they may not directly mitigate

Software vunerabilities


200

To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field

Degausse

200

What step in the Risk Management Framework assists in developing an organizational continuous monitoring strategy

Prepare

300

The role of the information system security officer (ISSO) is defined in which NIST standard

NIST SP 800-37 Rev. 2

300

To keep the organization aware of the systems' security posture and to support risk-based decision-making is best supported by

Continuous Monitoring

300

What is a collection of activities focused on establishing and maintaining the integrity of products and systems.

Configuration Management

300

A method of sanitization that renders the target data recovery infeasible and results in the subsequent inability to use the media again.

Destroy

300

Which NIST standard defines Incident Handling

NIST SP 800-61 Rev. 2

400

Configuration Management Plan is primarily focused on what parts of the information system?

TCB (Trusted Computing Base) which is hardware, OS, firmware

400

Name one of the factors which must be considered when assessing the impact of a change.

1. Change's scope

2. The systems and processes it touches

3. Potential to introduce new vulnerabilities

4. Potential to affect existing security controls

400

What is an identifiable part of a system which is a discrete target of configuration control

CI (Configuration Item)

400

A method of sanitization that applies physical or logical techniques that render target data recovery infeasible.

Purge

400

What are the correct steps in Incident Handling?

Preparation, Detection and Analysis, Containment, Eradication, Recovery, Post-Incident Activity

500

When planning for end-of-life, which NIST standard provides guidelines for Media Sanitization?

NIST SP 800-88 Rev. 1

500

Which group within the organization is responsible for reviewing all change requests?

CCB (Configuration Control Board)

500

What is a set of specifications for a system which has been formally reviewed and agreed on at a given point in time?

Baseline Configuration

500

What is the preferred method of data disposal for data located at a cloud service providers data center?

Crypto-shredding

500

What is the correct sequence of tasks for the Maintenance process according to NIST SP 160v1r1

1. Prepare for security aspects

2. Perform security aspects of maintenance

3. Perform security aspects of logistics

4.Manage results of security aspects

M
e
n
u