Chapter 12 - Managing Systems Support and Security Flashcards

1
Q

One of four risk control strategies. In __________, the risk is accepted and nothing is done. Risk is usually accepted only if protection from risk is clearly not worth the expense.

A

acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adds new capability and enhancements to an existing system.

A

adaptive maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An account that allows essentially unrestricted access to the application.

A

administrator account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Documents the system at the end of the design phase and identifies any changes since the functional baseline. The ________________ includes testing and verification of all system requirements and features.

A

allocated baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A person who works on new systems development and maintenance.

A

applications programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The storage of previous version of a system when a new version is installed.

A

archived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardware, software, data, networks, people, or procedures that provide tangible or intangible benefit to an organization.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hostile act that targets an information system, or an organization itself.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enables an application to contact the vendor’s server and check for a needed patch.

A

automatic update service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One of the three main elements of system security: confidentiality, integrity, and _______________ (CIA). ______________ ensures that authorized users have timely and reliable access to necessary information.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of four risk control strategies. In _____________, adding protective safeguards eliminates the risk.

A

avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data storage options, including tape, hard drives, optical storage, and online storage.

A

backup media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detailed instructions and procedures for all backups.

A

backup policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A formal reference point that measures system characteristics at a specific time. Systems analysts use ______________ as yardsticks to document features and performance during the systems development process.

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A form of testing used by companies to measure system performance.

A

benchmark testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mapping an individual’s facial features, handprint, or eye characteristics for identification purposes.

A

biometric scanning systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A password that must be entered before the computer can be started. It prevents an unauthorized person from booting a computer by using a secondary device.

A

BIOS-level password / Power-on Password / Boot-level password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A plan that defines how critical business functions can continue in the event of a major disruption.

A

business continuity plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.

A

capacity planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A process for controlling changes in system requirements during software development; also an important tool for managing system changes and costs after a system becomes operational.

A

change control (CC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The three main elements of system security: confidentiality, integrity, and availability.

A

CIA triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One of the three main elements of system security: ______________, integrity, and availability (CIA). ______________ protects information from unauthorized discloser and safeguards privacy.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A process for controlling changes in system requirements during the development phases of the SDLC. __ also is an important tool for managing system changes and costs after a system becomes operational.

A

configuration management (CM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A real-time streaming backup method that records all system activity as it occurs.

A

continuous backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Changes to the system to fix errors.

A

corrective maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Formal qualifications that include degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.

A

credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When risks are categorized and prioritized, ___________ (those with the highest vulnerability and impact ratings) head the list.

A

critical risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In normal operating conditions, any transaction that occurs on the primary system must automatically propagate to the hot site.

A

data replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A person who focuses on creating and supporting large-scale database systems.

A

database programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An online attack that occurs when an attacking computer makes repeated requests to a service or services running on certain ports.

A

denial of service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A backup that includes only the files that have changed since the last full backup.

A

differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A documented procedure consisting of an overall backup and recovery plan.

A

disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A service attack involving multiple attacking computers that can synchronize DOS attacks on a server.

A

distributed denial of service (DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Raiding desks or trash bins for valuable information.

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A new feature or capability.

A

enhancement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An attack that takes advantage of a system vulnerability, often due to a combination of one or more improperly configured services.

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The timely detection and resolution of operational problems. _____________________ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.

A

fault management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A system or application is said to be ________________ if the failure of one component does not disable the rest of the system or application.

A

fault tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The main line of defense between a local network, or intranet, and the Internet.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A complete backup of every file on the system.

A

full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The configuration of the system documented at the beginning of the project. It consists of all the necessary system requirements and design constraints.

A

functional baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Making a system more secure by removing unnecessary accounts, services, and features.

A

hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A separate IT location, which might be in another state or even another country, that can support critical business systems in the event of a power outage, system crash, or physical catastrophe.

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Controls and procedures necessary to identify legitimate users and system components.

A

identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The stealing of personally identifying information online.

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A security standard for Wi-Fi wireless networks that uses the WPA2 protocol, currently the most secure encryption method for Wi-Fi networks.

A

IEEE 802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Saving a copy of only the files that have changed since the last full backup.

A

incremental backup

48
Q

One of the three main elements of system security: confidentiality, __________, and availability (CIA). ____________ prevents unauthorized users from creating, modifying, or deleting information.

A

integrity

49
Q

A bandwidth or throughput measurement.

A

kilobits per second (Kbps)

50
Q

A device that can be inserted between a keyboard and a computer to record keystrokes

A

keystroke logger

51
Q

Record typically kept by operating systems and applications that documents all events, including dates, times, and other specific information. ____ can be important in understanding past attacks and preventing future intrusions.

A

log

52
Q

Changing programs, procedures, or documentation to ensure correct system performance. Adapting the system to changing requirements, and making the system operate more efficiently. Those needs are met by corrective, adaptive, perfective, and preventive maintenance.

A

maintenance activities

53
Q

Costs that vary significantly during the system’s operational life and include spending to support maintenance activities.

A

maintenance expenses

54
Q

A formal release of a new system version that contains a number of changes.

A

maintenance release

55
Q

A system of numbered releases used by organizations (especially software vendors) that helps organize maintenance changes and updates.

A

maintenance release methodology

56
Q

One or more systems analysts and programmers working on product maintenance issues together

A

maintenance team

57
Q

Malicious software that might jeopardize the system’s security or privacy.

A

malware

58
Q

Workload measurements, also called _________, include the number of lines printed, the number of records accessed, and the number of transactions processed in a given time period.

A

metrics

59
Q

One of four risk control strategies. ___________ reduces the impact of a risk by careful planning and preparation. For example, a company can prepare a disaster recovery plan to mitigate the effects of a natural disaster should one occur.

A

mitigation

60
Q

Two or more devices that are connected for the purpose of sending, receiving, and sharing data.

A

network

61
Q

A combination of hardware and software that allows the computer to interact with the network.

A

network interface

62
Q

Software that monitors network traffic to detect attempted intrusions or suspicious network traffic patterns and sends alerts to network administrators. Can be helpful in documenting the efforts of attackers and analyzing network performance.

A

network intrusion detection system (NIDS)

63
Q

The practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster such as a flood, fire, or earthquake.

A

offsiting

64
Q

Expenses that are incurred after a system is implemented and continue while the system is in use. Examples include system maintenance, supplies, equipment rental, and annual software license fees.

A

operational costs

65
Q

Concerned with managerial policies and controls that ensure secure operations.

A

operational security / procedural security

66
Q

Changes to a system to improve efficiency.

A

perfective maintenance

67
Q

Data that is not encrypted.

A

plain text

68
Q

A positive integer that is used for routing incoming traffic to the correct application on a computer.

A

port

69
Q

An attempt to detect the services running on a computer by trying to connect to various ports and recording the ports on which a connection was accepted.

A

Port scans

70
Q

Obtaining personal information under false pretenses.

A

pretexting

71
Q

Changes to a system to reduce the possibility of future failure.

A

preventive maintenance

72
Q

A common encryption technology called ___. The private key is one of a pair of keys, and it decrypts data that has been encrypted with the second part of the pair, the public key.

A

private key encryption

73
Q

A dedicated connection, similar to a leased telephone line.

A

private network

74
Q

An unauthorized attempt to increase permission levels.

A

privilege escalation attack

75
Q

Describes the system at the beginning of operation. The ________________ incorporates any changes made since the allocated baseline and includes the results of performance and acceptance tests for the operational system.

A

product baseline

76
Q

A designation for positions that require a combination of systems analysis and programming skills.

A

programmer/analyst

77
Q

A common encryption technique. Each user on the network has a pair of keys: a public key and a private key. The public key encrypts data that can be decrypted with the private key.

A

public key encryption (PKE)

78
Q

A _____ system may be part of an organization’s backup and recovery plans. A _____ system mirrors the data while processing continues. _____ systems are called fault-tolerant, because a failure of any one disk does not disable the system.

A

redundant array of independent disks (RAID)

79
Q

The process of restoring data and restarting a system after an interruption.

A

recovery

80
Q

Applications that allow IT staff to take over a user’s workstation and provide support and troubleshooting.

A

remote control software

81
Q

The overall time between a request for system activity and the delivery of the response. In the typical online environment, ______________ is measured from the instant the user presses the ENTER key or clicks a mouse button until the requested screen display appears or printed output is ready.

A

response time

82
Q

Backups are stored for a specific _________________ after which they are either destroyed or the backup media is reused.

A

retention period

83
Q

Measures the likelihood and impact of risks.

A

risk assessment

84
Q

Develops safeguards that reduce the likelihood and impact of risks.

A

risk control

85
Q

Hardware, software, and procedural controls that safeguard and protect a system and its data from internal or external threats.

A

security

86
Q

Created by a combination of one or more improperly configured services.

A

security hole

87
Q

A plan that addresses the three main elements of system security: confidentiality, integrity, and availability.

A

security policy

88
Q

A physical device that authenticates a legitimate user, such as a smart card or keychain device.

A

security token

89
Q

An application that monitors, or listens on, a particular port.

A

service

90
Q

A maintenance release supplied by commercial software suppliers.

A

service packs

91
Q

An intruder uses social interaction to gain access to a computer system.

A

social engineering

92
Q

Communications, interpersonal skills, perceptive abilities, and critical thinking are __________. IT professionals must have ____________ as well as technical skills.

A

soft skills

93
Q

Uses analytical techniques to identify potential quality and performance improvements in an information system.

A

software reengineering

94
Q

A login account that allows essentially unrestricted access to the application.

A

superuser account

95
Q

A person who is responsible for the CM and maintenance of an organization’s computer networks.

A

system administrator

96
Q

A person who concentrates on operating system software and utilities.

A

systems programmer

97
Q

A case designed to show any attempt to open or unlock the case.

A

Tamper-evident cases

98
Q

An application that is not developed in-house.

A

third-party software

99
Q

In risk management, an internal or external or external entity that could endanger an asset.

A

threat

100
Q

A measurement of actual system performance under specific circumstances and is affected by network loads and hardware efficiency.________________, like bandwidth, is expressed as a data transfer rate, such as Kbps, Mbps, or Gbps.

A

throughput

101
Q

One of four risk control strategies. In ________________, risk is shifted to another asset or party, such as an insurance company.

A

transference

102
Q

A secure network connection established between the client and the access point of the local intranet.

A

tunnel

103
Q

A measure applied to centralized batch processing operations, such as customer billing or credit card statement processing. __________________ measures the time between submitting a request for information and the fulfillment of the request. ____________________ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.

A

turnaround time

104
Q

Data that is not encrypted.

A

unencrypted

105
Q

Battery-powered backup power source that enables operations to continue during short-term power outages and surges.

A

uninterruptible power supply (UPS)

106
Q

Can be fastened to a cable lock or laptop alarm.

A

Universal Security Slot (USS)

107
Q

User-specific privileges that determine the type of access a user has to a database, file, or directory.

A

user rights / permissions

108
Q

The main objective of a _____________________ is to show users how the system can help them perform their jobs.

A

user training package

109
Q

The process of tracking system releases.

A

version control

110
Q

Uses a public network to connect remote users securely. Allows a remote client to use a special key exchange that must be authenticated by the ___.

A

virtual private network (VPN)

111
Q

A security weakness or soft spot.

A

vulnerability

112
Q

A feature of business support systems that allows analysis to define and account for a wide variety of issues (including issues not completely defined).

A

what-if analysis

113
Q

A common method used to secure a wireless network. This approach requires each wireless client be configured manually to use a special, pre-shared key, rather than key pairs. The most recent and more secure version is WPA2.

A

Wi-Fi Protected Access (WPA)

114
Q

One of the earliest methods used to secure a wireless network, superseded by WPA and WPA2.

A

Wired Equivalent Privacy (WEP)

115
Q

A wireless security standard based on 802.11i that provides a significant increase in protection over WEP and WPA.

A

WPA2