CH 11 Vulnerability and Risk Assessment Flashcards

1
Q

Risk organization

A

Transfer the risk to another organization or third party.
■ Avoid the risk.
■ Reduce the risk.
■ Accept some or all of the consequences of a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Qualitative

A

Assigns numeric values
1–100.
ex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative

A

Measures risk by using exact monetary
values. It

ex SLE × ARO = ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MTBF) .

A

average number of failures per million

hours of operation for a product in question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTTF)

A

which is a basic measure of reliability for devices that cannot be
repaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MTTR

A

time 2 repair problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management controls:

A

Managers set procedures, policies, legal and regulatory and SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

operation controls

A

executed by people

ppl training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tech contols

A

logical controls executed by the computer
system. Technical controls include authentication, access control, auditing,
and cryptography
Uses Raid 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security controls:

A

Prevent detective corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevent

A

NIPSs to prevent malicious activity, and

RAID 1 to prevent loss of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

detct catch action

A

CCTV/video surveillance, alarms, NIDSs, and auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Corrective

A

limit the

extent of damage an

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

password-cracking methods.

A

Dictionary attack brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary

A

prearranged list of likely words,

ex anbcdd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

brute force

A

every possible password instance

17
Q

Cryptanalysis attack

A

Uses a considerable set of precalculated encrypted passwords
located in a lookup table. These tables are known as rainbow tables ,
and the type of password attack is also known as precomputation, where all
words in the dictionary (or a specific set of possible passwords) are hashed and
stored.