Book Cards (set 3) Flashcards
What provides a detailed breakdown of the work to be performed, the timeline for completion, the expected deliverables, and the agreed-upon compensation?
Statement of Work (SOW)
What signifies that an organization acknowledges its responsibilities and will adhere to the prescribed regulations?
Attestation
How might you recover old data from an encrypted smart card?
A key escrow will have an old copy of the private keys
What agreement type is measured in metrics?
Service Level Agreement (SLA)
Apart from due diligence, what would prevent you from selecting a particular vendor?
Conflicts of interest
What type of pen testing works on a rewards basis?
Bug Bounty
What is your risk strategy if you take no action?
Risk Acceptance
How can you find out who amended a medical record?
Review the audit trail
What is Nessus?
A remote scanning tool that can identify vulnerabilities that hackers can exploit
What looks at payment terms, resolution mechanism disputes, confidentiality clauses, and liability provisions?
A Master Service Agreement
What is an on-path attack?
It is an interception attack, examples of which include Man-in-the-Middle and replay attacks
What type of attack uses a tar.gz file extension?
Remote Access Trojan (RAT)
Code phrases 1=1 and SELECT * are indicative of what kind of attack?
SQL Injection
What log files detail the surfing habits of a user?
DNS Log files
What framework examines the adversary, capabilities, infrastructure, and victim in an attack?
The Diamond Model of Intrusion Analysis