RM1 Flashcards

(34 cards)

0
Q

—- can be classified into different types: strategic, compliance, financial, operational, environmental, technical, and managerial.

A

Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A risk is the likelihood that the threat agent will exploit a ___].

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are different strategies for controlling risk. ____ is the process of assigning and revoking privileges to objects; that is, it covers the procedures of managing object authorizations.

A

Privilege management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One element of privilege management is periodic reviewing of a subject’s privileges over an object, and is known as ____

A

privilege auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____refers to a methodology for making changes and keeping track of those changes.

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Without ____ in procedures, a change may negate or diminish a previous change or even unknowingly create a security vulnerability.

A

proper documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change management seeks to approach changes systematically and provide the necessary ____] of the changes.

A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is the framework and functions required to enable incident response and incident handling within an organization.

A

Incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The objective of incident management is to ____ the normal operations as quickly as possible with the least possible impact on either the business or the users.

A

restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security policy is a ____

A

written document that states how an organization plans to protect the company’s information technology assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An effective security policy must carefully balance two key elements, _____.

A

trust and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security policy attempts to provide a balance between ____

A

no trust and too much trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The appropriate level of control is determined by the ____

A

security needs and the culture of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___] is a collection of requirements specific to the system or procedure that must be met by everyone

A

standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a collection of suggestions that should be implemented.

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ is a document that outlines specific requirements or rules that must be met, and is the correct means to be used for establishing security.

16
Q

Most organizations follow a three-phase cycle in the development and maintenance of a security policy. The first phase is a _____; the second phase is to use the _____ to ____. The final phase is to ____

A

risk management study
risk management study/ develop the policy
review the policy for compliance.

17
Q

An ___ defines the actions users may perform while accessing systems and networking equipment.

A

acceptable use policy (AUP)

18
Q

Because privacy is of growing concern, many organizations have a ____that outlines how the organization uses information it collects.

A

privacy policy

19
Q

Policies of the organization that address security as it relates to human resources are known as ____.

A

security-related human resource policies

20
Q

A ____addresses how passwords are created and managed.

A

password management and complexity policy

21
Q

A ____ addresses how to dispose of confidential resources. This policy often covers how long records and data will be retained.

A

disposal and destruction policy

22
Q

A _____ produces a standardized framework for classifying information assets.

A

classification of information policy

23
Q

An —- is a written code of conduct intended to be a central guide and reference for employees in support of day-to-day decision making.

A

ethics policy

24
To provide users with the knowledge and skills necessary to support information security, users need to receive ongoing ____
awareness and training.
25
_____ involve instruction regarding compliance, secure user practices, and an awareness of threats. There are also techniques that should be considered to make the training informative and useful.
Awareness and training
26
____ A policy that defines the actions users may perform while accessing systems and networking equipment.
acceptable use policy (AUP)
27
A methodology for making modifications to a system and keeping track of those changes.
change management
28
The “framework” and functions required to enable incident response and incident handling within an organization.
incident management
29
A network that does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network.
peer-to-peer (P2P) network
30
A policy that outlines how the organization uses personal information it collects.
privacy policy
31
A written document that states how an organization plans to protect the company’s information technology assets.
security policy
32
Grouping individuals and organizations into clusters or groups based on a like affiliation.
social networking
33
Web sites that facilitate linking individuals with common interests like hobbies, religion, politics, or school or work contacts.
social networking sites