Ch 15 Key Terms Flashcards

1
Q

permission to perform a cyber security test

penetration verification acceptance

vulnerability testing authorization

variance

vulnerability verification acceptance

A

vulnerability testing authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

calculates the avg amount of time until a component fails

mean time between failures (MTBF)

mean time to failure (MTTF)

Failure in time (FIT)

mean time to recovery (MTTR)

A

mean time between failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

prevents the threat from coming in contact with a vulnerability

deterrent control

preventive control

executive control

administrative controls

A

preventive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

average amount of time it will take a device to recover

mean time to failure (MTTF)

Failure in time (FIT)

mean time to recovery (MTTR)

mean time between failures (MTBF)

A

mean time to recovery (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sustained and continual surveillance

secure configuration guides

configuration validation

scalability

continuous monitoring

A

continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intended to mitigate the damage caused by the incident

detective control

preventive control

corrective control

compensating control

A

corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

propose change of IT systems; approved by the ______

change management chairperson

computer change management

change management board

change management team

A

change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

policy that defines the actions users may perform

executive policy

social media network

role-based awareness training

acceptable use policy

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using technology to automate IT processes

artificial intelligence

automated course of action

automation

IT automation

A

automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

states how a company plans to protect its IT assets

social media network

role-based awareness training

executive policy

security policy

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

of human origin, such as the vandalism of a wireless antenna

physical threat

natural threat

manmade threat

risk assessment

A

manmade threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

compiled historical data; determine the likelihood of a risk

ARI

ARO

SLE

ALE

A

ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

security controls carried out or managed by devices

corrective control

technical controls

compensating control

preventive control

A

technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intended to minimize security risks of data transmitted across the network

Blanket Purchase Agreement (BPA)

Memorandum of Understanding (MOU)

Interconnection Security Agreement (ISA)

Systems Security Agreement (SSA)

A

Interconnection Security Agreement (ISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a network that moves a product from the supplier to customer

assessment

supply chain assessment

retail assessment

supply chain

A

supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

permission to perform a cyber security test

penetration testing authorization

vulnerability verification acceptance

variance

penetration verification acceptance

A

penetration testing authorization

17
Q

ensure unwanted data is not carried forward; temporary

presistence tools

non-persistence tools

persistence

live boot media

A

non-persistence tools

18
Q

a subject’s access level over an object

least privilege

object ramification

least privilege management

privilege

A

privilege

19
Q

help IT security personnel configure hardware devices and software

security guides

configuration validation

secure configuration guides

scalability

A

secure configuration guides

20
Q

the processes for ensuring that policies are carried out

security control

administrative controls

physical control

executive control

A

administrative controls

21
Q

wrap up meeting between a management representative and a person leaving

out-bound interview

in-bound interview

Non-Disclosure Agreement (NDA)

exit interview

A

exit interview

22
Q

an educated guess based on observation

qualitative calculation

qualitative risk calculation

quantitative risk

quantitative risk calculation

A

qualitative risk calculation

23
Q

outlines acceptable employee use of social media to be enforced

tweeter media network

social media network

social media policy

group-based affiliation

A

social media policy

24
Q

process of authenticating information given to a potential employer

in-bound interview

security background check

background check

welcome interview

A

background check

25
Q

a continued or prolonged state

presistence tools

live boot media

non-persistence tools

persistence

A

persistence

26
Q

SLE x ARO

SLE

ARO

ARI

ALE

A

ALE

27
Q

demonstrates a convergence of will between parties

Blanket Purchase Agreement (BPA)

Memorandum of Inderstanding (MOI)

Interconnection Security Agreement (ISA)

Republican Democratic Agreement (RDA)

Memorandum of Understanding (MOU)

A

Memorandum of Understanding (MOU)

28
Q

a prearranged purchase between government and a business

Blanket Purchase Agreement (BPA)

Blanket Purse Agreement (BPA)

Interconnection Security Agreement (ISA)

Memorandum of Understanding (MOU)

A

Blanket Purchase Agreement (BPA)

29
Q

can report the number of expected failures of operations for a device

mean time to recovery (MTTR)

Failure in time (FIT)

mean time between failures (MTBF)

mean time to failure (MTTF)

A

Failure in time (FIT)

30
Q

a control that provides an alternative to normal controls

preventive control

compensating control

detective control

security control

A

compensating control

31
Q

formal process; examining the seriousness of potential threat

environmental threat

formal assessment

threat assessment

risk assessment

A

threat assessment

32
Q

the expected monetary loss every time a risk occurs

ARI

ARO

SLE

ALE

A

SLE

33
Q

from the outside (like the action of a hacktivist)

natural assessment

natural threat

external threat

internal threat

A

external threat