Chapter 14 Flashcards

1
Q

What concept below is at the very heart of information security?

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Due to the potential impact of changes that can affect all users in a organization, and considering that
security vulnerabilities can arise from uncoordinated changes, what should an organization create to
oversee changes?

A

change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What may be defined as the components required to identify, analyze, and contain an incident?

A

Incident reponse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name for a framework and corresponding functions required to enable incident response
and incident handling within an organization?

A

Incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A written document that states how an organization plans to protect the company’s information
technology assets is a:

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of suggestions that should be implemented are referred to as a:

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select below the option that best describes a policy:

A

A document that outlines specific requirements or rules that must be met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Generally considered to be the most important information security policies, what item below defines
the actions a user may perform while accessing systems and networking equipment?

A

Acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of policy outlines how organizations use personal information it collects?

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies that include statements regarding how an employee’s information technology resources will
be addressed are part of a:

A

security-related human resource policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person’s fundamental beliefs and principals, which are used to define what is good, and how to
distinguish right from wrong, are collectively called a person’s:

A

Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are values that are attributed to a system of beliefs that help the individual distinguish right
from wrong called?

A

Morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can be defined as the study of what a group of people understand to be good and right behavior
and how people make those judgments?

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of network below uses a direct connection between users, and involves each device
simultaneously acting as a client and a server?

A

P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Websites that group individuals and organizations into clusters or groups based on some sort of
affiliation are considered to be what type of websites?

A

social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which term below describes the art of helping an adult learn?

A

andragogica

17
Q

What kind of learners learn from taking notes, being at the front of the class, and watching
presentations?

18
Q
What type of learner tends to sit in the middle of the class and learns best through lectures and
discussions?
19
Q

What type of learner learns best through hands-on approaches?

A

Kinesthetic

20
Q

What is the most common type of P2P network?

A

Bittorrent