Conklin-5th(Ch19-25)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

**5. What is the primary objective of change management

>A. To enable beneficial changes to be made, with minimum disruption to IT services

**13. How is quarantine accomplished

>A. With the erection of firewalls that restrict communication between machines

*1. What two components are necessary for successful incident response?

>B. Knowledge of one's own systems and knowledge of the adversary

*8. How do most advanced persistent threats (APTs) begin

>B. Most APTs begin through a phishing or spear phishing attack.

**10. What is a software bomb?

>B. Software that can destroy or modify files when commands are executed on the computer

Cookie-Cutter

>C. It prevents the transfer of cookies between browsers and web servers.

*10. Which attack involves the planting of software in the victim's network, creating network backdoors and tunnels to allow stealth access to its infrastructure

>D. Remote administration Trojan (RAT) attack

** 18. Which calculated value determines the threshold for evaluating the cost/benefit ratio of a given countermeasure?

ALE

**2. Which data destruction method is considered to be one of the gold standard methods?

Burning

**8. Which law regulates unsolicited commercial e-mail

CAN-SPAM act

*5. __________ requires that sites obtain parental permission, post a privacy policy detailing specifics concerning information collected from children, and describe how the children's information will be used

COPPA

*1. Which term is directly related to managing and controlling software development, maintenance, and system operation

Change Management

*13. Which alternative site provides the basic environmental controls necessary to operate, but has few of the computing components necessary for processing?

Cold site

**4. __________ is the unauthorized entry into a computer system via any means

Computer trespass

*1. Which plan defines the data and resources necessary and the steps required to restore critical organizational processes?

DRP (Disaster Recover Plan)

**4. What are the two components comprising information criticality?

Data classification and the quantity of data involved

*1. __________ are responsible for the day-to-day caretaking of data.

Data custodians

**23. Which term implies the concept of "don't keep what you don't need"

Data minimization

**13. Which term refers to a measure of the magnitude of loss of an asset

EF (Exposure Factor)

*7. In an "old school" attack, which step is a listing of the systems and vulnerabilities to build an attack game plan.

Enumeration

*4. A school principle allows for student information to be accessed by a marketing company in exchange for goods and services for the school. The principle may have violated which law

FERPA

**3. Which law was designed to enable public access to U.S. government records

FOIA

*5. Which backup technique requires a large amount of space and is considered to have a simple restoration process

Full backup

**11. Which of the following has the least volatile data

Hard disk

*15. Which type of alternative site generally use trailers, often rely on generators for their power but also factor in the requirement for environmental controls immediately

Mobile site

*2. What DRP category would a business function fall under if an organization could last without that function for up to 30 days before the business was severely impacted?

Necessary for normal processing

**2. Which term refers to the process of subjectively determining the impact of an event that affects a project, program, or business

Qualitative risk assessement

**20. Which RAID configuration, known as striped disks, simply spreads the data that would be kept on the one disk across several disks?

RAID 0

**21. Which RAID configuration, known as mirrored disks, copies the data from one disk onto two or more disks

RAID 1

**1. Which term refers to the possibility of suffering harm or loss?

Risk

**11. Which law overhauled the financial accounting standards for publicly traded firms in the United States

Sarbanes-Oxley act

**6. Which term refers to the examination of machines to determine what operating systems, services, and vulnerabilities exist?

Scanning

**22. Which term ensures that no single individual or organization possesses too much control in a process, helping to prevent errors and fraudulent or malicious acts?

Segregation of Duties

**3. What is a foundation for change management?

Separation of Duties

**1. A law that is passed by a legislative branch of government is known as a(n) __________.

Statutory

**9. Which term refers to characteristics of resources that can be exploited by a threat to cause harm

Vulnerabilities

*11. Which alternative site is partially configured, usually having peripherals and software, but perhaps not the more expensive main processing components and is designed to be operational within a few days?

Warm site

*14. The term __________ describes a series of digits near the beginning of the file that provides information about the file format.

magic number

*19. Which term is a mechanism where traffic is directed to identical servers based on availability

Load balancing

**25. Which RAID configuration, known as block-striped with error check, is a commonly used method that stripes the data at the block level and spreads the parity data across the drives

RAID 5

*4. Which strategy is focused on backup frequency?

RPO (Recovery Point Object)

**17. Which formula represents the annualized loss expectancy (ALE)

ALE = (SLE)(ARO) (single loss expect X annualized rate occurrence)

**16. Which statistical term is a representation of the frequency of the event, measured in a standard year

ARO

**2. Laws and regulations that are created by government-sponsored agencies such as the EPA, the FAA, and the FCC are known as __________.

Administrative

*11. In which step of the general risk management model do you determine which controls to put in place to mitigate the risks

Control Design & Evaluation (Step 4)

*7. Which backup requires a small amount of space and is considered to have a complex restoration process?

Delta backup

*3. Which term describes a circumstance that increases the likelihood or probable severity of a loss

Hazard

*10. Which type of alternative site is a fully configured environment that is similar to the normal operating environment and can be operational immediately or within a few hours, depending on its configuration and the needs of the organization

Hot site

**4. All accesses and privileges to systems, software, or data should be granted based on

Least Privilege

*12. What is the mechanism for self-regulation that can be enforced through trade practice law via the FTC?

Safe Harbor

**25. Which term refers to the path or tool used by an attacker to attack a target

Threat Vector

**13. Clusters that are marked by the operating system as usable when needed are referred to as __________.

free space

*6. Which backup requires a medium amount of space and is considered to have an involved restoration process?

Incremental backup

**3. What is the primary determinant in determining the level of incident response and a key measure used to prioritize actions throughout the incident response process?

Information Criticality

*23. Which tool is most useful for depicting interdependencies between project activities, showing the sequence and duration of each activity

PERT chart

*12. What name is given to a logical storage unit that is subsequently used by an operating system?

Partition


संबंधित स्टडी सेट्स

ASCA Ethical Standards for School Counselors

View Set

English 11 Unit 1 synonyms and antonyms

View Set