Lot 7 Flashcards

1
Q

Directly related to business needs, SDO is the level

of services

A

Service delivery objective (SDO) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An agreement, preferably documented, between a
service provider and the customer(s)/user(s) that defines minimum performance target
for a service and how they will be measured

A

Service level agreement (SLA) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security technique in which two or more entities
separately hold data items that individually convey no knowledge of the information that
results from combining the items; a condition under which two or more entities
separately have key components that individually convey no knowledge of the plaintext
key that will be produced when the key components are combined in the cryptographic
module

A

Split knowledge/split key -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A mandatory requirement, code of practice, or specification approved by a
recognized external standards organization, such as International Organization for
Standardization (ISO)

A

Standard -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Person or organization having responsibility for the development,
procurement, integration, modification, operation, and maintenance, and/or final
disposition of an information system

A

System owner -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anything (e.g., object, substance, human) that is capable of acting against an
asset in a manner that can result in harm. A potential cause of unwanted incident.
(ISO/IEC 13335)

A

Threat -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methods and things used to exploit a vulnerability. Examples include
determination, capability, motive, and resources

A

Threat agent -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An evaluation of the type, scope, and nature of events of actions that
can result in adverse consequences; identification of the threats that exist against
information assets. The threat analysis usually also defines the level of threat and the
likelihood of it materializing.

A

Threat analysis -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The identification of types of threats to which an organization might be exposed

A

Threat assessment -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any event where a threat element/actor acts against an asset in a manner that has the potential to directly result in harm

A

Threat event -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to describe a given threat and the harm it could do to a system if it
has a vulnerability

A

Threat model -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The method a threat uses to exploit the target

A

Threat vector -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Includes the original cost of the computer plus the cost
of: software, hardware, and software upgrades, maintenance, technical support, training,
and certain activities performed by users

A

Total cost of ownership (TCO)-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A weakness in the design, implementation, operation, or internal controls
in a process that could be exploited to violate system security

A

Vulnerability -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A process of identifying and classifying vulnerabilities

A

Vulnerability analysis -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly