Cybersecurity Fundamentals Part 1 (Week4)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An event that can negatively impact an organization's information assets or operations is termed an ______.

Adverse Event

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes _____. All of the above controls have been bypassed controls have failed controls have proven ineffective

All of the above

This type of planning ensures that critical business functions continue if a catastrophic incident or disaster occurs.

Business Continuity (BC)

The team assigned to manage the business continuity plan, which involves relocating operations to an alternate site post-disaster, is the ______.

Business Continuity Planning Team (BCPT)

A high-level manager that supports, promotes, and endorses the findings of a project.

Champion

The process involving senior management's definition of actions in the face of potential incidents, including preparation and remedial steps, is called ______.

Contingency Planning (CP)

The team comprised of senior managers and members tasked with carrying out all contingency planning activities is known as the ______.

Contingency Planning Management Team (CPMT)

The collection of individuals from different areas within the organization who are responsible for the crisis management plan is called the ______.

Crisis Management Planning Team (CMPT)

The term for investigation of wrongdoing in the arena of information security.

Digital Forensics

This type of planning encompasses preparation for handling and recovering from a disaster, whether natural or human-made.

Disaster Recovery (DR)

The team in charge of orchestrating the organization's strategy for preparation, response, and recovery from disasters is the ______.

Disaster Recovery Planning Team (DRPT)

A disaster recovery plan shows the organization's intended efforts to establish operations at an alternate site in the aftermath of a disaster. True False

False

A rapid-onset disaster is one that gradually degrades the capacity of an organization to withstand their effects. True False

False

A(n) DR plan ensures that critical business functions continue if a catastrophic incident or disaster occurs. True False

False

A(n) disaster is any adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization. True False

False

A(n) disaster recovery plan includes the steps necessary to ensure the continuation of the organization when a disaster's scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business functions to an alternate location. True False

False

A(n) sequential roster is activated as the first person calls a few people on the roster, who in turn call a few other people. True False

False

An affidavit is permission to search for evidentiary material at a specified location or to seize items to return to an investigator's lab for examination. True False

False

An incident is an adverse event that could result in a loss of information assets and threatens the viability of the entire organization. True False

False

Reported attacks are a definite indicator of an actual incident. True False

False

Root cause analysis is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or similar setting. True False

False

The computer security incident response team is composed solely of technical IT professionals who are prepared to detect, react to, and recover from an incident. True False

False

The total time needed to place the business function back in service must be longer than the maximum tolerable downtime. True False

False

An adverse event that begins to manifest as a real threat to information.

Incident

The process by which the IR team examines an incident candidate and determines whether it constitutes an actual incident.

Incident Classifcation

The group tasked with creating and administering the organization's protocol for preparedness, reaction, and recuperation from incidents is the ______.

Incident Response Planning Team (IRPT)

The maximum duration an organization can withstand a process outage is referred to as the ______.

Maximum Tolerable Downtime (MTD)

These are the three categories of incident indicators.

Possible, Probable, and Definite

The specific time before a disruption from which data must be recovered is known as the ______.

Recovery Point Objective (RPO)

Which if these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams? So individuals don't find themselves with different responsibilities in different locations at the same time. To spread the work out among more people. To avoid cross-division rivalries. To allow people to specialize in one area.

So individuals don't find themselves with different responsibilities in different locations at the same time.

A service bureau is an agency that provides a service for a fee. True False

True

An affidavit is a sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place. True False

True

An alert message is a description of the incident or disaster that usually contains just enough information so that each person knows what portion of the IR or DR plan to implement without slowing down the notification process. True False

True

Disaster classification is the process of examining an adverse event or incident and determining whether it constitutes an actual disaster. True False

True

Incident classification is the process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident. True False

True

Incident damage assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets. True False

True

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment. True False

True

The disaster recovery planning team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters. True False

True

The organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: protect and forget or apprehend and prosecute. True False

True

The recovery point objective (RPO) is the point in time prior to a disruption or system outage to which mission/business process data can be recovered after an outage. True False

True

The work recovery time (WRT) is the amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered. True False

True

The time required to restore business operations after the technological components are back online is termed the ______.

Work Recovery Time (WRT)

The sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place is called a(n) _____. sworn warrant writ of habeus corpus search warrant affidavit

affidavit

Ideally, the _____, systems administrators, the chief information security officer (CISO), and key IT and business managers should be actively involved during the creation and development of all CP components senior auditor chief executive officer (CEO) chief information officer (CIO) chief financial officer (CFO)

chief information officer (CIO)

The process of examining an adverse event or incident and determining whether it constitutes an actual disaster is known as _____. incident review event escalation disaster classification disaster indication

disaster classification

The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____. electronic vaulting database shadowing remote journaling off-site storage

electronic vaulting

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a moment's notice. service bureau hot site mobile site cold site

hot site

The total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption is _____. work recovery time (WRT) recovery time objective (RTO) maximum tolerable downtime (MTD) recovery point objective (RPO)

maximum tolerable downtime (MTD)


Ensembles d'études connexes

SAS Base Programming Review - Numeric Answers Only

View Set

TXKTKE01 - Nguyên lý kế toán

View Set

Review Sheet Drugs and Diagnosis

View Set

BUS LAW Ch. 8-Internet Law, Social Media, and Privacy

View Set

Micro Economics Study Guide Test 2

View Set

Cell Membrane Structure and Function

View Set