IS3230 CHAPTER 2 Flashcards

1
Q

The number of times per year we can expect a compromise to occur is called ___.

A

ANNUAL RATE OF OCCURRENCE (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The total cost per year of the threat under assessment. ALE is calculated by multiplying the SLE by the ARO.

A

ANNUALIZED LOSS EXPECTANCY (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The relative value, either in monetary terms or in overall impact, of the resource being protected by the access control system is called.

A

ASSET VALUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What it costs an organization to obtain or create an asset originally is called ___.

A

COST OF ATTAINMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What an organization would lose if an asset were unavailable. Ex: The organization might lose $50,000 per hour in lost productivity if its internal network went down.

A

COST OF IMPACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What it would cost an organization to replace an asset if it were stolen or compromised is called ___.

A

COST OF REPLACEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An action taken to counter another action is called ___.

A

COUNTERMEASURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The approach of using multiple layers of security to protect against a single point of failure is called ___.

A

DEFENSE-IN-DEPTH STRATEGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability of an attacker to log into a system under one level of access and exploit a vulnerability to gain a higher level of access is called ___.

A

HEIGHTENED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A problem-solving system that uses a set of rules to select the best answer available. In virus scanning, ___ refers to an algorithm that uses a set of rules that is constantly revised based on feedback to determine whether a given file contains a virus.

A

HEURISTICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A combination of hardware and software used to analyze network traffic passing through a single point on the network. It is designed to analyze traffic patterns to find suspicious activity is called ___.

A

INTRUSION DETECTION SYSTEM (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A combination of a firewall and an IDS. An ___ is designed to analyze network traffic patterns and react in real time to block suspicious activity.

A

INTRUSION PREVENTION SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used to create secure pathways for data through a public network is called ___.

A

IP TUNNELING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network connecting computers and other assets in a small, physical location such as an office, home, or school is called ___.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The combination of more than one access control method to secure a single resource is called ___.

A

MULTILAYERED ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Guessing or deciphering passwords is called ___.

A

PASSWORD CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Creating legitimate-looking Web sites or emails that trick a user into entering sensitive information such as passwords, Social Security numbers, or credit card numbers is called ___.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The likelihood that an attack will occur is called ___.

A

PROBABILITY OF OCCURRENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A method of risk assessment that assigns a subjective label (usually “high”, “medium”, and “low” to a risk scenario is called ___.

A

QUALITATIVE RISK ASSESSMENTS

20
Q

A method of risk assessment that assigns a dollar value to every data point is called ___.

A

QUANTITATIVE RISK ASSESSMENTS

21
Q

The probability that a particular threat will exploit an IT vulnerability causing harm to an organization is called ___. It is measured in terms of probability and consequence.

22
Q

The process of identifying and prioritizing risk is called ___.

A

RISK ASSESSMENT

23
Q

The cost incurred in one loss incident is called ___.

A

SINGLE LOSS EXPECTANCY (SLE)

24
Q

An ID badge or other card with an embedded RFID chip that stores basic identification and authentication information is called ___.

A

SMART CARD

25
The use of manipulation or trickery to convince authorized users to perform actions or divulge sensitive information to an attacker is called ___.
SOCIAL ENGINEERING
26
An attack targeted at specific, usually high-level, individuals within an organization is called ___.
SPEAR PHISHING
27
A potential attack on a system is called a ___.
THREAT
28
A system that uses a public network (usually the Internet) to transmit private data securely. Users on a ___ can exchange data and share resources as if they were directly connected via a LAN.
VIRTUAL PRIVATE NETWORK (VPN)
29
Allows network managers to segment resources into local area networks despite geographical distance. EX: if a work group's office space was reallocated and the individuals in the group were reassigned to new offices spread across the building, a ___ could be created to allow them the same resource sharing abilities they had when their offices were located in a geographically small area.
VIRTUAL LOCAL AREA NETWORK (VLAN)
30
An unintended weakness in a system's design that makes it possible for attackers to take control of a system, access resources to which they are not authorized, or damage the system in some way is called ___.
VULNERABILITY
31
A network that connects several smaller networks. EX: a large corporation with offices in New York, Chicago, and Los Angeles might have a LAN in each local office, and then connect those three LANs via a ___.
WIDE AREA NETWORK (WAN)
32
1. Risk is measured in terms of ___ and impact.
Probability of occurrence
33
2. Risk assessment is the first step in designing any access control system. TRUE OR FALSE
TRUE
34
3. The two types of risk assessments are qualitative and ___.
Quantitative
35
4. Vulnerabilities and threats are synonymous. | TRUE OR FALSE
FALSE
36
5. A vulnerability is a weakness purposely designed into the system. TRUE OR FALSE
FALSE
37
6. You should consider probability of occurrence in order to prioritize limited time and resources. TRUE OR FALSE
FALSE
38
7. What are the three primary threats to any access control system? 1. Password cracking 2. Heightened access 3. Social engineering 4. Forgotten passwords
Password cracking Heightened access Social engineering
39
8. A strong password that would take an attacker 10 years to crack in 1990 would take 10 years to crack today. TRUE OR FALSE
FALSE
40
9. As long as users choose strong, secure passwords, how those passwords are stored is irrelevant. TRUE OR FALSE
FALSE
41
10. Insecure applications run as the administrative user are the most common heightened access vulnerability. TRUE OR FALSE
TRUE
42
11. You should weigh the value of the assets and their relative risk level against the cost and inconvenience of the access control. TRUE OR FALSE
TRUE
43
12. You calculate ALE by multiplying SLE by 12. | TRUE OR FALSE
FALSE
44
13. You should install every patch that is released for the applications running in your environment. TRUE OR FALSE
FALSE
45
14. Calculate the ALE of a threat that can be expected to occur three times per year, and will cost the organization $50,000 per incident. ___.
$150,00
46
15. Calculate the ARO of a threat with an SLE of $100,000 and an ALE of $200,000.
Annual Rate of Occurrence (ARO)=2
47
16. Calculate the SLE of a threat with an ARO of 4 and an ALE of $100,000.
$25,000