19B: Administrative and Operational Controls Flashcards

4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.

1
Q

The security approach to restricting availability of a resource to authorized users only.

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The processes of planning, analysis, design, implementation, and maintenance that often govern software and systems development.

A

software development lifecycle (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A dynamic code analysis technique that involves sending a running application random and unusual input so as to evaluate how the app responds.

A

fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

A

mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.

A

job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policies or configuration settings that limit a user’s access to resources.

A

time of day restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly