Governance Flashcards

(42 cards)

1
Q

IT Governance

A

A comprehensive security management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Policy (Security)

A

*Defines the role of security inside of an organization
*Establishes the desired end state for that program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organizational Policy (Security)

A

*Meet business goals
*Define the roles, responsibilities, and terms associated with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System-specific Policy (Security)

A

Addresses the security o a specific technology, application, network, or computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Issue-specific Policy (Security)

A

Addresses a specific security issue *Email privacy,
*Employee termination procedures *Other specific issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standard (Sec Policy)

A

Implements a policy in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baseline (Sec Policy)

A

Creates a reference point in network architecture and design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guideline (Sec Policy)

A

Recommended action that allows for exceptions in unique situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedure (Sec Policy)

A

Detailed step-by step instructions to perform a give task or series of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Change Management

A

Structured way of changing the state of a computer system, network, or IT procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident Response Plan

A

Instructions to detect, respond to , and recover from security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steps of an Incident Response Plan

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Continuity Plan

A
  • How a business will continue operating during an unplanned disruption
  • Long-Term
  • Contains a Disaster Recovery Plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Life Cycle Plan

A

Describes the approach to maintaining an asset from creation to disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Planning

A

Planning and requirement analysis for a system, including architecture outlining risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standard Operating Procedure

A

Step-by-step instructions to carry out routine operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memorandum of Understanding (MOU)

A

Non-binding agreement between two or more organization to detail what common actions they intend to take

17
Q

Service-Level Agreement (SLA)

A

Documents the quality, availability, and responsibilities agree upon by a service provider and a client

18
Q

Baseline Configuration

A

Set of specifications for
*Information system
*Configuration item within a system
That has been formally reviewed and agreed upon

19
Q

Physical Network Diagram

A

Shows the actual physical arrangement of network components

20
Q

Logical Network Diagram

A

Illustrates the flow of data across a network and how devices communicate with each other

21
Q

Wiring Diagram

A

Labels which cables are connected to which ports

22
Q

Radio Frequency (Wireless) Site Survey

A

Planning/designing a wireless network to deliver the required wireless solution

23
Q

Wired Site Survey

A

Determines if a site has the right amount of power, space, and cooling to support a new upgrade or installation

24
Audit and Assessment Report
Delivered after a formal assessment has been conducted
25
Sensor
Monitors a device's temperature, CPU usage, and memory, which could indicate if it is operating properly or about to fail
26
Minor Temperature Threshold
Set off an alert when a rise in temperature is detected but hasn't reached dangerous levels
27
Major Temperature Threshold
Used to set off an alarm when temperature reaches dangerous conditions
28
Safe temperature range for network devices
between 50 and 90 F
29
Network Availability
*How well a network can respond to connectivity and performance demands *Measured as Uptime: Time network was up ÷ time network was down in a monitoring period
30
Mean Time to Repair (MTTR)
Average time it takes to repair a device
31
Mean Time Between Failures (MTBF)
Average time between when failures occur on a device
32
Cloud Site
Allows for the creation of a recovery version of an organization's enterprise network in the cloud
33
Recovery Time Objective (RTO)
Time and service level within which a business process must be restored to avoid unacceptable consequences
34
Recovery Point Objective (RPO)
Time during a disruption before data lost exceeds the maximum allowable threshold or tolerance
35
Full Backup
Complete backup of every single file on a machine
36
Backs up data that changed since last backup
Incremental Backup
37
Snapshot
Read-only copy of data frozen in time
38
Power Distribution Unit (PDU)
Distributes electric power to rack of computers and networking equipment located in a data center
39
Pre-Action System
A detector actuation like a smoke detector and sprinkler must be tripped prior to water being released
40
Statement of Work (SOW)
A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines. (not on going like SLA)
41
Policy vs. Standard
* Policies are plans that describe the goal of an established procedure (Acceptable use, Physical Security, or VPN access) * Standards are the mechanisms implemented to achieve that goal. VPN and HTTPS are examples of protocols and industry standards.