Fundamentals of Information Security

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

cold site

Least expensive but has longest switchover time

Risk methodology

A description of how you will manage overall risk. It includes the approach, required information, and techniques to address each risk.

disaster recovery plan

A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

Recovery Time Objective (RTO)

Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining?

HIPAA

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?

Warm site

Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?

Business Continuity Plan

Guidelines and arrangements for response to disruption of critical business functions, to restore and maintain operation.

hot site

Most expensive option, least switchover

Business continuity plan (BCP)

Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort?

Mobile site

Very flexible fairly short switchover time and widely varying costs based on size and capacity

Family Education Rights and Privacy Act (FERPA)

What compliance regulation applies specifically to the educational records maintained by schools about students?

safety

What is NOT one of the three tenets of information security?

No technology infrastructure

What level of technology infrastructure should you expect to find in a cold site alternative data center facility?

Risk = Threat x Vulnerability

Which formula is typically used to describe the components of information security risks?

Data Ownership

Which item in a Bring Your Own Device (BYOD) policy helps resolve intellectual property issues that may arise as the result of business use of personal devices?

Facility Repair

Which one of the following is an example of a direct cost that might result from a business disruption?


Kaugnay na mga set ng pag-aaral

Chapter 49: Assessment and Management of Patients With Hepatic Disorders NCLEX

View Set

Smart Book Assignment Chapter 1- MGMT 363 Exam 1

View Set

Exam 1 Study Guide- Theory and Research in Language Development

View Set

ACC Systems 2 Trinkle Ch 1-4, ACC Systems II - Trinkle

View Set

Criminal Law Regionals 2016: Chapter 6

View Set

Midterm Review Questions- Chapter 3- AP Government

View Set

G - Pilots, pilot burners, thermocouples and Thermopiles

View Set

Chapter 9: Small Business Marketing: Customers and Products

View Set

Definition of Leisure, Play and Recreation

View Set