Operational Procedures Flashcards

1
Q

Includes procedures and guidelines for use of network resources written in terms appropriate to the user’s access level and technological knowledge, such as password creation and responsible network use

A

Acceptable use policies (AUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Govern codified expectations of user privacy and consent to security-based monitoring of user activity.

A

Privacy policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Specify exactly what steps will be taken in response to a security incident, in order to minimize and repair damage without exposing the network to further risk.

A

Incident response policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Specify the steps that will be taken to secure assets, protect staff, and maintain business operations in terms of natural or artificial disasters and disruptions.

A

Disaster planning and business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Guidelines for updating policies and procedures to suit changing needs, without introducing new vulnerabilities.

A

Change management policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lists of step by step instructions to perform routine tasks.

A

Standard operating procedures (standing operating procedures in military organizations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regulations for all federal government agencies

A

FISMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regulations for patient data in health care systems

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Regulations for corporate financial data

A

Sarbanes-Oxley (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Standards for systems handling payment card data

A

PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network and system documentation

A
  1. Physical and logical diagrams of the network
  2. A list of IT assets including hardware and software
  3. Vendor documentation and configuration baselines
    for listed assets
  4. Vendor documentation for deployed assets
  5. Assigned MAC and IP addresses, and available IP
    addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managing IT inventory

A

IT asset management (ITAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A way to track all assets in an automated fashion.

A

configuration management database (CMDB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The change management process

A
  1. Identification
  2. Change request
  3. Approval
  4. Preparation
  5. Implementation
  6. Follow-up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authority to determine whether the request is reasonable and necessary, and to identify any oversights or errors the original proposal might have.

A

change advisory board (CAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A statement describing how management intends the organization is to be run

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A description of best practices or recommendations for achieving a certain policy goal

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technical definition of specific methodologies or requirements which are needed to satisfy policies

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A specific and ordered instruction for complying with a particular element of a policy or standard

A

Procedure

20
Q

Responding to an incident

A

Identify the problem
Report the incident
Preserve the data and devices involved in the incident.

21
Q

Documenting incidents

A
  • A general description of the incident
  • The total impact of the incident, including its scope,
    cost, and duration
  • Policies which may have been violated
  • Problems with the response process
  • Recommendations for preventing recurrence
22
Q

The maximum expected amount of time needed to fully restore service after a disaster

A

RTO: Recovery time objective

23
Q

The maximum period of data which will be lost in the case of a disaster

A

RPO: Recovery point objective

24
Q

The average amount of time between when you install a device and when it will fail.

A

MTTF: Mean time to failure

25
Q

The average amount of time a component or system can remain online before it needs to be taken down for repair

A

MTBF: Mean time between failures

26
Q

The average amount of time a component or system will remain offline for repair in the event of a disaster

A

MTTR: Mean time to repair

27
Q

The ability of a system to continue operating in at least partial capacity despite the failure of one or more components.

A

Fault tolerance

28
Q

Preserve important files or folders so that they can be restored to the same or a different system when needed.

A

File level backups

29
Q

Copy entire hard drives or other storage volumes, allows you to quickly restore a fully configured computer to an operative state.

A

Image level backups

30
Q

Designed to back up application servers running database software or other critical, constantly running applications

A

Application-aware backups

31
Q

Backs up all files that are included in the backup policy regardless of their archive bits, then clears the bit for all files

A

Full Backup

32
Q

Backs up only files with a set archive bit, then clears the bit

A

Incremental Backup

33
Q

Backs up files with a set archive bit, but does not clear the bit after

A

Differential

34
Q

What are the three parts of first response when an incident occurs?

A

Identify
Report through proper channels
Data/device preservation

35
Q

According to the A+ exam guide, what is the purpose of the chain of custody?

A

Tracking of evidence/documenting process

36
Q

What does the acronym PCI denote?

A

Payment Card Industry

37
Q

What does the acronym GDPR denote?

A

General Data Protection Regulation

38
Q

Which documentation is maintained by hardware or software vendors?

A

knowledge base/articles

39
Q

What should be documented to ensure that you can return to normal operations and reverse a change if a change does not work or causes problems?

A

backout plan

40
Q

Which type of backup uses maximum disks and tapes for storing data?

A

Full backup

41
Q

Which device contains a battery and Automatic Voltage Regulation (AVR) circuitry to protect a computer from power sags?

A

Uninterruptible Power Supply (UPS)

42
Q

The average amount of time a component or system can remain online before it needs to be taken down for repair

A

Mean time between failures (MTBF)

43
Q

The maximum period of data which will be lost in the case of a disaster

A

Recovery point objective (RPO)

44
Q

The average amount of time between when a device is installed and when it will fail

A

Mean time to failure (MTTF)

45
Q

The average amount of time a component or system will remain offline for repair in the event of a disaster

A

Mean time to repair (MTTR)

46
Q

The maximum expected amount of time needed to fully restore service after a disaster

A

Recovery time objective (RTO)