Chapter 18: Managing Risk Flashcards

1
Q

Risk Management

A

The process of how organizations deal with the bad things that take place on their networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Breach

A

Any form of attack where secured data is taken or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptable Use Policy

A

Defines what is and what is not acceptable to do on an organization’s computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Policy

A

Defines who may access the network, how they may access the network, and what they access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Change Management

A

The process of creating change in your infrastructure in an organized, controlled, safe way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Strategic-Level Changes

A

Typically initiated by management and major in scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrastructure-Level Changes

A

Typically initiated by a department making a request to the change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A good change request will include:

A

1) Type of change
2) Configuration Procedures
3) Rollback Process
4) Potential Impact
5) Notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patch Management

A

Regularly updating operating systems and applications to avoid security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When do we generally apply driver updates?

A

To fix an incompatibility, incorporate new features, or repair a bug.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability Patch

A

A patch used to quickly respond to a major vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It’s important that users understand:

A

1) Security Policies
2) Passwords
3) System and Workplace Security
4) Social Engineering
5) Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Single Point of Failure

A

One system that, if it fails, will bring down an entire process, workflow or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

High Availability (HA)

A

The ability for a system to keep working without interruption or downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Failover

A

The ability for backup systems to detect when a master has failed and the to take over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virtual IP

A

A single IP address shared by multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP)

A

Take multiple routers and gang them together into a single virtual router with a single virtual IP that clients use as a default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Service Level Agreement (SLA)

A

A document between a customer and a service provider that defines the scope, quality, and terms of the service to be provided.

19
Q

What does a typical SLA contain?

A

1) Definition of the service provided
2) Equipment provided
3) Technical Support that will be given

20
Q

Memorandum of Understanding (MOU)

A

A document that defines an agreement between two parties in situations where a legal contract wouldn’t be appropriate.
Defines the duties the parties commit to perform for each other.

21
Q

Multi-Source Agreement

A

A document that details the interoperability of various manufacturers’ components.

22
Q

Statement of Work (SOW)

A

Defines the services and products the vendor agrees to supply and the time frame in which to supply them.

23
Q

Vulnerability Scanner

A

Inspects potential vulnerabilities and creates a report.

24
Q

Nmap

A

A port scanner, which queries individual nodes, looking for open or vulnerable ports.

25
Q

Nessus

A

Popular and extremely comprehensive vulnerability testing tool.

26
Q

Penetration Testing

A
  • A purposeful attack by a hacker to see if it can be penetrated.
  • Aircrack-ng and Metasploit
27
Q

Contingency Plans

A

How to limit damage and recover quickly from incidents.

28
Q

Incident Response Level

A

Incidents that can be stopped, contained, and remediated without outside resources.

29
Q

Disaster Recovery Level

A

An incident that can no longer be contained, causing significant damage or danger to the immediate infrastructure.

30
Q

Business Continuity Level

A

If the disaster requires actions offsite from the primary infrastructure.

31
Q

Recovery Point Objective (RPO)

A

The state of the backup when the data is recovered.

32
Q

Recovery Time Objective (RTO)

A

The amount of time needed to restore full functionality

33
Q

Cold Site

A

A location that consists of everything a business needs except computers.

34
Q

Warm Site

A

Like a cold site but with computers loaded with software and functioning servers. However, lacks current data.

35
Q

Hot Site

A

Nearly a complete duplicate of the primary site.

36
Q

Computer Forensics

A

The science of gathering, preserving, and presenting evidence stored on a computer or any form of digital media that is presentable in a court of law.

37
Q

4 Steps to Computer Forensics

A

1) Secure the Area
2) Document the Scene
3) Collect Evidence
4) Interface with Authorities

38
Q

Electronic Discovery

A

The process of requesting and providing electronic and stored data and evidence in a legal way.

39
Q

Electrical Safety topics

A

1) Inherent danger of electricity
2) Grounding
3) Static

40
Q

Ground Loop

A

A voltage differential that exists between two different grounding points, causing data to become unreadable, and also exposes equipment to more risk from power surges.

41
Q

Electrostatic Discharge (ESD)

A

The passage of a static electrical charge from one item to another. It can damage or destroy computing equipment.

42
Q

What is the ideal temperature and humidity for equipment?

A

68 degrees F, 50% humidity

43
Q

Material Safety Data Sheet (MSDS)

A

Document that describes the safe handling procedures for any potentially hazardous, toxic, or unsafe material.

44
Q

Emergency Procedures 5 Essential Aspects

A

1) Building Layout
2) Fire Escape Plan
3) Safety/emergency exits
4) Fail open/Fail close
5) Emergency Alert System