Modules 4-6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The point in time before a disruption or system outage to which business process data can be recovered after an outage is ____.

recovery point objective (RPO)

The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources is ____.

recovery time objective (RTO)

As each information asset is identified, categorized, and classified, a(n) _____ value must be assigned to it.

relative

The first phase of the risk management process is _____.

risk identification

A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor.

service agreement

A ____ is an agency that provides physical facilities in the event of a disaster for a fee.

service bureau

Risk _____ is the application of security mechanisms to reduce the risks to an organization's data and information systems.

treatment

The CPMT should include a _____ who is a high-level manager to support, promote, and endorse the findings of the project and could be the COO or (ideally) the CEO/president.

champion

Ideally, the _____, systems administrators, the chief information security officer (CISO), and key IT and business managers should be actively involved during the creation and development of all CP components

chief information officer (CIO)

The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.

identity theft

Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present?

All of the other answers are correct

The CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages? a. Determine mission/business processes and recovery criticality b. Identify resource requirements c. Identify recovery priorities for system resources d. All of these are BIA stages

All of these are BIA stages

The _____ is a respected professional society that was established in 1947. Today it is "the world's largest educational and scientific computing society.

Association for Computing Machinery

_____ law comprises a wide variety of laws pertaining to relationships among individuals and organizations.

Civil

Which of the following acts defines and formalizes laws to counter threats from computer-related acts and offenses?

Computer Fraud and Abuse Act of 1986

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Financial Services Modernization Act

Which of the following is NOT one of the categories recommended for categorizing information assets?

Firmware

The Digital _____ Copyright Act is the American contribution to an international effort by the World Intellectual Properties Organization (WIPO) to reduce the impact of copyright, trademark, and privacy infringement.

Millennium

Risk _____ is a determination of the extent to which an organization's information assets are exposed to risk.

analysis

The storage of duplicate online transaction data, along with the duplication of the databases, at a remote site on a redundant server is called _____.

database shadowing

The process of examining an adverse event or incident and determining whether it constitutes an actual disaster is known as _____.

disaster classification

Which if these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams?

So individuals don't find themselves with different responsibilities in different locations at the same time.

____ uses a number of hard drives to store information across multiple drive units.

RAID

The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

Security and Freedom through Encryption Act

In the 1999 study of computer use-ethics, which of the following countries reported the least tolerant attitudes toward misuse of organizational computing resources?

Singapore


संबंधित स्टडी सेट्स

Introduction to Joint Fundamentals

View Set

Introduction to RPA and Automation

View Set

Anthology Grade 8 - The last Leaf

View Set

Medical Terminology: Digestive and Renal Systems - Word Parts, Functions, Anatomy, Tests

View Set

BIS 4753 Structured systems analysis-Final Exam

View Set

Fordneys Medical Insurance Chapters 1 - 9 true or false

View Set

Abnormal Psychology Case Study Examples

View Set