Ch 15 Key Terms Flashcards

1
Q

permission to perform a cyber security test

penetration verification acceptance

vulnerability testing authorization

variance

vulnerability verification acceptance

A

vulnerability testing authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

calculates the avg amount of time until a component fails

mean time between failures (MTBF)

mean time to failure (MTTF)

Failure in time (FIT)

mean time to recovery (MTTR)

A

mean time between failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

prevents the threat from coming in contact with a vulnerability

deterrent control

preventive control

executive control

administrative controls

A

preventive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

average amount of time it will take a device to recover

mean time to failure (MTTF)

Failure in time (FIT)

mean time to recovery (MTTR)

mean time between failures (MTBF)

A

mean time to recovery (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sustained and continual surveillance

secure configuration guides

configuration validation

scalability

continuous monitoring

A

continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intended to mitigate the damage caused by the incident

detective control

preventive control

corrective control

compensating control

A

corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

propose change of IT systems; approved by the ______

change management chairperson

computer change management

change management board

change management team

A

change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

policy that defines the actions users may perform

executive policy

social media network

role-based awareness training

acceptable use policy

A

acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using technology to automate IT processes

artificial intelligence

automated course of action

automation

IT automation

A

automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

states how a company plans to protect its IT assets

social media network

role-based awareness training

executive policy

security policy

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

of human origin, such as the vandalism of a wireless antenna

physical threat

natural threat

manmade threat

risk assessment

A

manmade threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

compiled historical data; determine the likelihood of a risk

ARI

ARO

SLE

ALE

A

ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

security controls carried out or managed by devices

corrective control

technical controls

compensating control

preventive control

A

technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intended to minimize security risks of data transmitted across the network

Blanket Purchase Agreement (BPA)

Memorandum of Understanding (MOU)

Interconnection Security Agreement (ISA)

Systems Security Agreement (SSA)

A

Interconnection Security Agreement (ISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a network that moves a product from the supplier to customer

assessment

supply chain assessment

retail assessment

supply chain

A

supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

permission to perform a cyber security test

penetration testing authorization

vulnerability verification acceptance

variance

penetration verification acceptance

A

penetration testing authorization

17
Q

ensure unwanted data is not carried forward; temporary

presistence tools

non-persistence tools

persistence

live boot media

A

non-persistence tools

18
Q

a subject’s access level over an object

least privilege

object ramification

least privilege management

privilege

19
Q

help IT security personnel configure hardware devices and software

security guides

configuration validation

secure configuration guides

scalability

A

secure configuration guides

20
Q

the processes for ensuring that policies are carried out

security control

administrative controls

physical control

executive control

A

administrative controls

21
Q

wrap up meeting between a management representative and a person leaving

out-bound interview

in-bound interview

Non-Disclosure Agreement (NDA)

exit interview

A

exit interview

22
Q

an educated guess based on observation

qualitative calculation

qualitative risk calculation

quantitative risk

quantitative risk calculation

A

qualitative risk calculation

23
Q

outlines acceptable employee use of social media to be enforced

tweeter media network

social media network

social media policy

group-based affiliation

A

social media policy

24
Q

process of authenticating information given to a potential employer

in-bound interview

security background check

background check

welcome interview

A

background check

25
a continued or prolonged state presistence tools live boot media non-persistence tools persistence
persistence
26
SLE x ARO SLE ARO ARI ALE
ALE
27
demonstrates a convergence of will between parties Blanket Purchase Agreement (BPA) Memorandum of Inderstanding (MOI) Interconnection Security Agreement (ISA) Republican Democratic Agreement (RDA) Memorandum of Understanding (MOU)
Memorandum of Understanding (MOU)
28
a prearranged purchase between government and a business Blanket Purchase Agreement (BPA) Blanket Purse Agreement (BPA) Interconnection Security Agreement (ISA) Memorandum of Understanding (MOU)
Blanket Purchase Agreement (BPA)
29
can report the number of expected failures of operations for a device mean time to recovery (MTTR) Failure in time (FIT) mean time between failures (MTBF) mean time to failure (MTTF)
Failure in time (FIT)
30
a control that provides an alternative to normal controls preventive control compensating control detective control security control
compensating control
31
formal process; examining the seriousness of potential threat environmental threat formal assessment threat assessment risk assessment
threat assessment
32
the expected monetary loss every time a risk occurs ARI ARO SLE ALE
SLE
33
from the outside (like the action of a hacktivist) natural assessment natural threat external threat internal threat
external threat