08092017_Wiley_Test2 Flashcards
(90 cards)
Trademark can be renewed for ____ years
10
Best intellectual property protection ..
Trade Secret
How many rounds of encryption for DES
DES uses 16 rounds
Waterfall allow you to return the last previous ____
State
3DES effective key length
168bit
What uses passwords for a challenge-response mechanism to create a one-time password
Asynchronous One Time Password
Disaster ________involves restoring a business facility and environment to a workable state
restoration
The ________ evidence rule states that when an agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement and no verbal agreements may modify the written agreement
parol
_____ _____ ____viruses infect the system’s boot sector and load when the system is started
Master boot record (MBR)
__________ espionage is usually considered a business attack
Industrial
The Agile ________ says that you should build projects around motivated individuals and give them the support they need
Manifesto
A custodian is someone who has been assigned to or delegated the _____ to _____responsibility of proper storage and protection of objects.
day-to-day
_________ tests are similar to the structured walk-throughs. In this test, disaster recovery team members are presented with a scenario and asked to develop an appropriate response
Simulation
Systems are usually disconnected from the network during the _______ and _______process
isolation and recovery
RESTORATION phase of incident response includes these steps:
Restoring backup data
Rebuilding compromised systems
Supplementing existing security controls
____________ XORs the plain text with a separate subkey before the first round of encryption. Used in TWOFISH
Prewhitening
The US Geological Survey provides detailed _________ risk data for locations in the United States
earthquake
__________ occurs when a person presents him- or herself as another user, typically to gain access to unauthorized information or processes.
Masquerading. Keyword is UNAUTHORIZED.
THis includes physical access
Loss expectancies are a measure of impact and are calculated during the ______ assessment phase
IMPACT
You are concerned about the risk that a tornado poses to your corporate headquarters in Indiana. The building itself is valued at $10 million. After consulting with the National Weather Service, you determine that there is a 2 percent likelihood that a tornado will strike over the course of a year. You hired a team of architects and engineers who determined that the average tornado would destroy approximately 25 percent of the building. What is the annualized loss expectancy (ALE)?
The ALE is computed by multiplying the SLE ($2,500,000) by the annualized rate of occurrence (2%) to get $50,000.
A ______ access control model is based on job functions such as a sales person or a sales manager, and it groups users into roles. .
role-based
A ______access control model is an identity-based access control model. This is also OWNER based
discretionary
A ________access control model is based on rules within an ACL
rule-based
A ______ access control model uses assigned labels to identify access.
mandatory