Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

10.3. Exam Domain Quick Reference Tables

Domain 1: Critical Formulas and Thresholds

ItemValueNotes
ALE formulaALE = SLE × AROAnnual Loss Expectancy
Safeguard justification(ALE_before − ALE_after) > Annual safeguard costCost-benefit for controls
NIST RMF steps6: Categorize, Select, Implement, Assess, Authorize, MonitorContinuous
ISC2 Ethics canon 1Protect society, common good, public trustHighest priority
GDPR breach notification72 hours to supervisory authorityFrom awareness
GDPR max penalty€20M or 4% global annual revenue, whichever higher

Domain 3: Cryptography Quick Reference

ItemValue
AES key sizes128, 192, 256 bits
RSA minimum key size2048 bits (3072+ recommended)
ECDSA equivalent strength256-bit ECDSA ≈ 3072-bit RSA
SHA-1 statusDeprecated — do not use
SHA-256+Current standard
MD5 statusBroken — do not use
TLS minimumTLS 1.2 (TLS 1.3 preferred for new deployments)
Bell-LaPadulaNo Read Up, No Write Down (confidentiality)
BibaNo Read Down, No Write Up (integrity)
BLP + Biba rulesOpposite — cannot both apply simultaneously

Domain 4: Network Protocol Reference

ProtocolPortNotes
SSH22Encrypted remote access
HTTPS443TLS-encrypted web
DNS53TCP + UDP; DNSSEC adds origin auth
DHCP server67UDP
RADIUS1812/1813Authentication / accounting
TACACS+49Cisco; TCP; full encryption
Kerberos88UDP/TCP
LDAPS636TLS-encrypted LDAP
BGP179TCP; RPKI for route origin validation
IPsec ESPProtocol 50Encryption + integrity
IPsec AHProtocol 51Integrity only; no NAT traversal

Domain 5: IAM Decision Table

ScenarioAnswer
Phishing-resistant MFAFIDO2 / passkeys
Weakest MFASMS OTP
Enterprise SSO to SaaSSAML 2.0
App user authentication (modern)OpenID Connect
API authorization delegationOAuth 2.0
Windows/AD SSOKerberos
Biometric accuracy metricCER / EER (lower = better)
Cannot be changed if compromisedBiometric (inherence factor)
Privileged account controlsPAM: JIT access, session recording, credential vaulting

Domain 7: BCP/DR Decision Table

ItemDefinitionWho Sets It
MTDMaximum Tolerable Downtime — business ceilingBusiness owners
RTORecovery Time Objective — IT target; must be < MTDIT + Business
RPOMax acceptable data loss in time; drives backup frequencyBusiness owners
Hot siteMinutes to hours RTO; real-time replicationVery High cost
Warm siteHours to days RTO; periodic backup restorationMedium cost
Cold siteDays to weeks RTO; empty facilityLow cost
Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications