Chapter 11 Flashcards

1
Q

risk management

A

The identification, assessment, and prioritization of risks, and the
mitigation and monitoring of those risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information assurance

A

The practice of managing risks that are related to computer
hardware and software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

risk transference

A

The transfer or outsourcing of risk to a third party. Also known as
risk sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

risk avoidance

A

When an organization avoids risk because the risk factor is too great.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

residual risk

A

The risk that is left over after a security plan and a disaster recovery plan
have been implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

quantitative risk

A

assessment An assessment that measures risk by using exact monetary
values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

qualitative risk assessment

A

An assessment that assigns numeric values to the probability
of a risk and the impact it can have on the system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

mean time between failures

A

Defi nes the average number of failures per million hours
for a product in question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open Vulnerability and Assessment Language (OVAL)

A

A standard and a programming
language designed to standardize the transfer of secure public information across networks
and the Internet utilizing any security tools and services available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

banner grabbing

A

A technique used to gain information about servers and take inventory
of systems and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

protocol analyzer

A

Software tool used to capture and analyze packets.
proxy server Acts as an intermediary between clients, usually located on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

dictionary attack

A

A password attack that uses a prearranged list of likely words, trying
each of them one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cryptanalysis attack

A

A password attack that uses a considerable set of precalculated
encrypted passwords located in a lookup table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rainbow table

A

In password cracking, a set of precalculated encrypted passwords located
in a lookup table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

salting

A

The randomization of the hashing process to defend against cryptanalysis password
attacks and rainbow tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly