NT2580 Chapter 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An audit examines whether security controls are appropriate, installed correctly, and ________.

Addressing their purpose

Post-audit activities include which of the following?

All of the Above

Which of the following is an example of a level of permissiveness?

All of the Above

A ________ is a standard used to measure how effective your system is as it relates to industry expectations.

Benchmark

Host isolation is the isolation of internal networks and the establishment of a(n) ________.

DMZ

A hardened configuration is a system that has had unnecessary services enabled.

False

________ is used when it's not as critical to detect and respond to incidents immediately.

Non-real-time monitoring

The review of the system to learn as much as possible about the organization, its systems, and networks is known as ________.

Reconnaissance

A common platform for capturing and analyzing log entries is ________.

Security Information and Event Management (SIEM)

In ________ methods, the IDS compares current traffic with activity patterns consistent with those of a known network intrusion via pattern matching and stateful matching.

Signature-based

Some of the tools and techniques used in security monitoring include baselines, alarms, closed-circuit TV, and honeypots.

True

When you use a control that costs more than the risk involved, you're making a poor management decision.

True


संबंधित स्टडी सेट्स

I Know Why The Caged Bird Sings: Finals

View Set

Fundamentals Nursing Prep U Chapter 40 Self-Concept

View Set

Chapter 5 Properties of Triangles

View Set

5 Steps of Respiration (Respiratory)

View Set

Discrete Mathematics II Study Cards

View Set

CEA 1º ESO TEMA 7: CLASIFICACIÓN DE LOS SERES VIVOS

View Set