11-3 Flashcards

1
Q

the nature of IT is ________, so its important to have a change control process

A

change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a change control request should have the following

A
manager signs request
it unit verifies the request
it unit verifies the change
it unit plans to implement change
date and time of change scheduled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

you must have some sort of plan for how to respond should a security _________ occur.

A

breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when a virus hits your system immediately ___________ that system

A

quarantine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

after a successful quarantine has been implemented, you should take the following steps

A
scan / clean each machine
log the incident
bring machines online in stages
notify appropriate leaders
roundtable with IT staff tp discuss breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

use firewall logs or IDS to find out which IP address ____________ the attack

A

originates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

be aware that an intrusion investigation could tune into a __________ investigation

A

criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

every incident response team should have some training in digital ____________

A

forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

immediately copy the logs of all affected ___________

A

systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

immediately ________ all systems for trojan horses, firewall setting changes, etc.

A

scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

document _______________

A

everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

change all affected user ___________

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

inform appropriate leaders of the incident, followed by an IT

A

roundtable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

with __________ , you want to make sure that your data is accurate, confidential, and available only to those who are authorized

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

no matter how good your firewalls, proxy server, virus scanning, and policies. if your developers create a code that is flawed, you will have ______________

A

security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly