IS3220 CHAPTER 6 Flashcards
(42 cards)
Less rigorous than training or education this security training focuses on common or basic security elements that all employees must know and abide by. This is called ___?
AWARENESS
This process of making copies of data onto other storage media is called ___?
The purpose is to protect against data loss by having additional onsite or offsite copies of data that can be restored when necessary.
BACKUP
A plan to maintain the mission-critical functions of the organization in the event of a problem that threatens to take business processes offline is called ___?
The goal is to prevent the interruption of business tasks, even with a damaged environment and reduced resources.
BUSINESS CONTINUITY PLAN
A detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy and any applicable laws and regulations is called ___?
COMPLIANCE AUDIT
A security stance that blocks all access to all resources until a valid authorized explicit exemption is defined is called ___?
DEFAULT DENY
A security stance that allows all access to all resources until an explicit exception is defined is called ___?
DEFAULT PERMIT
A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event is called ___?
The goal of this is to return the business to functional operation within a limited time to prevent the failure of the organization to the incident.
DISASTER RECOVERY PLAN
The third and highest level of obtaining security knowledge that leads to career advancement is called ___?
This is broad and not necessarily focused on specific job tasks or assignments. More rigorous than awareness or training.
EDUCATION
A form of security protection that protects individual files by scrambling the contents in such a way as to render them unusable by unauthorized third parties is called ___?
FILE ENCRYPTION
A collection of multiple honey pots in a network for the purposes of luring and trapping hackers is called ___?
HONEYNET
A predefined procedure to react to security breaches to limit damage, contain the spread of malicious content, stop compromise of information, and promptly restore the environment to a normal state. This is called ___?
INCIDENT RESPONSE PLAN
The state or condition of an asset or process vitally important to the long-term existence and stability of an organization is called ___?
If this element is interrupted or removed, it often results in the failure of the organization.
MISSION-CRITICAL
Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?
PADDED CELL
The guideline that all users should be granted only the minimum level of access and permission required to perform their assigned job tasks and responsibilities is called ___?
PRINCIPLE OF LEAST PRIVILEGE
A security guideline, procedure, or recommendation manual is called ___?
SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS)
An administrative rule whereby no single individual possesses sufficient rights to perform certain actions is called ___?
Achieved by dividing administrative level tasks and powers among compartmentalized administrators.
SEPARATION OF DUTIES
The use of only a single element of validation or verification to prove the identity of a subject and considered much weaker than multi-factor authentication is called ___?
SINGLE-FACTOR AUTHENTICATION
The second level of knowledge distribution offered by an organization to educate users about job task focused security concerns is called ___?
More rigorous than awareness: less rigorous than education.
TRAINING
A dedicated microchip found on some motherboards that host and protect the encryption key for whole hard drive encryption is called ___?
TRUSTED PLATFORM MODULE (TPM)
A form of investigation that aims at checking whether or not a target system is subject to attack based on a database of test, scripts, and simulated exploits is called ___?
VULNERABILITY SCANNING
The process of encrypting an entire hard drive rather than just individual files is called ___?
In most cases, this provides better security against unauthorized access than file encryption, because it encrypts temporary directories and slack space.
WHOLE HARD DRIVE ENCRYPTION
- All of the following are examples of network security management best practices EXCEPT:
- Write a security policy
- Obtain senior management endorsement
- Filter Internet connectivity
- Provide fast response time to customers
- Implement defense-in-depth
Provide fast response time to customers
- All of the following are examples of network security management best practices EXCEPT:
- Avoid remote access
- Purchase equipment from a single vendor
- Use whole heard drive encryption
- Implement IPSec
- Harden internal and border devices
Purchase equipment from a single vendor
- All the following are examples of network security management best practices EXCEPT:
- Use multi-factor authentication
- Backup
- Have a business continuity plan
- Prioritize
- Spend each year’s budget in full
Spend each year’s budget in full