Deck 2 Flashcards

(14 cards)

1
Q

If an energy company (with cyclical demand) rents servers, storage and firewalls from a cloud service provider who needs flexibility of scaling usage up or down will use_____

A

IAAS - THIS TYPE OF CSP DOES NOT PROVIDE SUPPORT BEYOND VIRTUAL INFRASTRUCTURE BUT MAINTAINS FLEXIBILITY OF SCALING USAGE UP OR DOWN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which service allows users to develop and maintain their own application but generally not operating systems ?

A

PAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which service providers manage much more on the range of offerings than other CSPs ?

A

SAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which step in business impact analysis (BIA) does MTD, MTTR occur?

A

STEP 5 - ESTABLISH RECOVERY PRIORITIES

BIA STEPS - 1.ESTABLISH BIA APPROACH 2. IDENTIFY CRITICAL RESOURCES 3. DEFINE DISRUPTION IMPACT 4. ESTIMATE LOSSES 5. ESTABLISH RECOVERY PRIORITIES 6. CREATE THE BIA REPORT 7.IMPLEMENT BIA RECOMMENDATIONS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which step in business impact analysis (BIA) does ARO and ALE occur?

A

STEP 4 - ESTIMATE LOSSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Between a service org, service auditor, user auditor who is responsible for presenting the description of tests of controls and results?

A

SERVICE AUDITOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a company wants to build its own application while delegating responsibilities for managing infrastructure, operating system and development of environment to a cloud service provider then which model to choose?

A

PAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When CSP supplies infrastructure capabilities while company manages its applications and operating system___

A

IAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When CSP manages application deployment, maintenance, configuration and underlying IT support____

A

SAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In NIST Privacy Framework Core functions, ____ function has five categories including data protection policies, processes and procedures, identity management, authentication, access control, data security?

A

PROTECT FUNCTION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which IT component sends and receives data packets ?

A

ROUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which metric system is used for maximum amount of some metric that is defined as intolerable (and can be measured in some quantitative measure)?

A

RPO - RECOVERY POINT OBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly