IAM Exam 1 Anki Cards questions with precise ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
detailed solutions ||\\//||
affect - correct answer✔✔to change something
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
attack - correct answer✔✔Exploiting a vulnerability to cause harm or loss
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
authenticity - correct answer✔✔the user is personally identified ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
basic methods of risk management - correct answer✔✔Prevent
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Deter
Deflect
Detect
Recover
CIA - correct answer✔✔Confidentiality, Integrity, Availability
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
CISSP - correct answer✔✔Certified Information Systems Security Professional
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
CNSS - correct answer✔✔Committee on National Security Systems. Has education
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
certifications including NSTISSI-4011 which is this class. ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Computing System Elements - correct answer✔✔Computing System ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Hardware
Software
, Storage Media ||\\//||
Data
Networks
People
Eager - correct answer✔✔positive emotion anticipating a good event
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
identification - correct answer✔✔Access is proven valid, but the person is unknown
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
ISO 27001:2013 - correct answer✔✔International Standards Organization certificate for
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Information Assurance. For organizations, not individuals ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Military Domains - correct answer✔✔Air ||\\//|| ||\\//|| ||\\//|| ||\\//||
Land
Sea
Space
Cyberspace
policy - correct answer✔✔A broad statement about an organization's view
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
State-sponsored hacking - correct answer✔✔Computer and network intrusions supported by ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
a government.
||\\//||
asymmetric encryption - correct answer✔✔Two keys, either can be used to encrypt or
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
decrypt but only the other key can do the reverse. Key 1 encrypts then only Key 2 can
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
decrypt, and vice versa ||\\//|| ||\\//|| ||\\//||
detailed solutions ||\\//||
affect - correct answer✔✔to change something
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
attack - correct answer✔✔Exploiting a vulnerability to cause harm or loss
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
authenticity - correct answer✔✔the user is personally identified ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
basic methods of risk management - correct answer✔✔Prevent
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Deter
Deflect
Detect
Recover
CIA - correct answer✔✔Confidentiality, Integrity, Availability
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
CISSP - correct answer✔✔Certified Information Systems Security Professional
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
CNSS - correct answer✔✔Committee on National Security Systems. Has education
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
certifications including NSTISSI-4011 which is this class. ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Computing System Elements - correct answer✔✔Computing System ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Hardware
Software
, Storage Media ||\\//||
Data
Networks
People
Eager - correct answer✔✔positive emotion anticipating a good event
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
identification - correct answer✔✔Access is proven valid, but the person is unknown
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
ISO 27001:2013 - correct answer✔✔International Standards Organization certificate for
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Information Assurance. For organizations, not individuals ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
Military Domains - correct answer✔✔Air ||\\//|| ||\\//|| ||\\//|| ||\\//||
Land
Sea
Space
Cyberspace
policy - correct answer✔✔A broad statement about an organization's view
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
State-sponsored hacking - correct answer✔✔Computer and network intrusions supported by ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
a government.
||\\//||
asymmetric encryption - correct answer✔✔Two keys, either can be used to encrypt or
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
decrypt but only the other key can do the reverse. Key 1 encrypts then only Key 2 can
||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//|| ||\\//||
decrypt, and vice versa ||\\//|| ||\\//|| ||\\//||