Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
10.3. Exam Domain Quick Reference Tables
Domain 1: Critical Formulas and Thresholds
| Item | Value | Notes |
|---|---|---|
| ALE formula | ALE = SLE × ARO | Annual Loss Expectancy |
| Safeguard justification | (ALE_before − ALE_after) > Annual safeguard cost | Cost-benefit for controls |
| NIST RMF steps | 6: Categorize, Select, Implement, Assess, Authorize, Monitor | Continuous |
| ISC2 Ethics canon 1 | Protect society, common good, public trust | Highest priority |
| GDPR breach notification | 72 hours to supervisory authority | From awareness |
| GDPR max penalty | €20M or 4% global annual revenue, whichever higher |
Domain 3: Cryptography Quick Reference
| Item | Value |
|---|---|
| AES key sizes | 128, 192, 256 bits |
| RSA minimum key size | 2048 bits (3072+ recommended) |
| ECDSA equivalent strength | 256-bit ECDSA ≈ 3072-bit RSA |
| SHA-1 status | Deprecated — do not use |
| SHA-256+ | Current standard |
| MD5 status | Broken — do not use |
| TLS minimum | TLS 1.2 (TLS 1.3 preferred for new deployments) |
| Bell-LaPadula | No Read Up, No Write Down (confidentiality) |
| Biba | No Read Down, No Write Up (integrity) |
| BLP + Biba rules | Opposite — cannot both apply simultaneously |
Domain 4: Network Protocol Reference
| Protocol | Port | Notes |
|---|---|---|
| SSH | 22 | Encrypted remote access |
| HTTPS | 443 | TLS-encrypted web |
| DNS | 53 | TCP + UDP; DNSSEC adds origin auth |
| DHCP server | 67 | UDP |
| RADIUS | 1812/1813 | Authentication / accounting |
| TACACS+ | 49 | Cisco; TCP; full encryption |
| Kerberos | 88 | UDP/TCP |
| LDAPS | 636 | TLS-encrypted LDAP |
| BGP | 179 | TCP; RPKI for route origin validation |
| IPsec ESP | Protocol 50 | Encryption + integrity |
| IPsec AH | Protocol 51 | Integrity only; no NAT traversal |
Domain 5: IAM Decision Table
| Scenario | Answer |
|---|---|
| Phishing-resistant MFA | FIDO2 / passkeys |
| Weakest MFA | SMS OTP |
| Enterprise SSO to SaaS | SAML 2.0 |
| App user authentication (modern) | OpenID Connect |
| API authorization delegation | OAuth 2.0 |
| Windows/AD SSO | Kerberos |
| Biometric accuracy metric | CER / EER (lower = better) |
| Cannot be changed if compromised | Biometric (inherence factor) |
| Privileged account controls | PAM: JIT access, session recording, credential vaulting |
Domain 7: BCP/DR Decision Table
| Item | Definition | Who Sets It |
|---|---|---|
| MTD | Maximum Tolerable Downtime — business ceiling | Business owners |
| RTO | Recovery Time Objective — IT target; must be < MTD | IT + Business |
| RPO | Max acceptable data loss in time; drives backup frequency | Business owners |
| Hot site | Minutes to hours RTO; real-time replication | Very High cost |
| Warm site | Hours to days RTO; periodic backup restoration | Medium cost |
| Cold site | Days to weeks RTO; empty facility | Low cost |
Written byAlvin Varughese
Founder•15 professional certifications