Chapter 1 Flashcards

1
Q

Today, people working in cyberspace must deal with new and constantly evolving ________.

A

threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connecting your computers or devices to the ________ immediately exposes them to attack.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________ is the duty of every government that wants to ensure its national security.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ___________ gives priorities to the functions an organization needs to keep going.

A

business continuity plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SIP is a ___________ protocol used to support real-time communications.

A

signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.

A

disaster recovery plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.

A

End-User License Agreement (EULA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ is the practice of hiding data and keeping it away from unauthorized users.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is the process of transforming data from cleartext into ciphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.

A

Recovery time objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.

A

Workstation Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.

A

Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ____________ represents the fourth layer of defense for a typical IT infrastructure.

A

LAN-to-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ is a collection of computers connected to one another or to a common connection medium.

A

local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media.

A

network interface card (NIC)

17
Q

With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________.

A

wireless access point (WAP)

18
Q

This security appliance examines IP data streams for common attack and malicious intent patterns.

A

intrusion detection system (IDS)

19
Q

The ________ is where the fourth layer of defense is required.

A

LAN-to-WAN Domain

20
Q

The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site.

A

Secure Sockets Layer virtual private network (SSL-VPN)

21
Q

The _________ Domain connects remote users to the organization_s IT infrastructure.

A

Remote Access

22
Q

What fills security gaps and software weaknesses?

A

Testing and quality assurance

23
Q

The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data.

A

data classification standard

24
Q

Which of the following is the definition of ciphertext?

A

The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.

25
The requirement to keep information private or secret is the definition of __________.
confidentiality
26
The act of transforming cleartext data into undecipherable ciphertext is the definition of __________.
encryption
27
What name is given to an exterior network that acts as a buffer zone between the public Internet and an organization's IT infrastructure (i.e., LAN-to-WAN Domain)?
demilitarized zone (DMZ)
28
What term is used to describe the amount of time that an IT system, application, or data is not available to users?
downtime
29
Which of the following describes the Family Educational Rights and Privacy Act (FERPA)?
A U.S. federal law that protects the private data of students, including their transcripts and grades, with which K-12 and higher-education institutions must comply.
30
What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens_ private data and have proper security controls in place?
Federal Information Security Management Act (FISMA)
31
(T/F) Today_s LAN standard is the Institute of Electrical and Electronics Engineers (IEEE) 802.
TRUE
32
(T/F) Hypertext Transfer Protocol (HTTP) is the communications protocol between Web browsers and Web sites with data in cleartext.
TRUE
33
(T/F) The network security group is responsible for the Internet-to-WAN Domain.
FALSE
34
(T/F) Typically, the director of IT security ensures that the company meets WAN Domain security policies, standards, procedures, and guidelines.
TRUE
35
(T/F) Multiprotocol Label Switching (MPLS) is a WAN software feature that allows customers to maximize performance.
TRUE
36
(T/F) The weakest link in the security of an IT infrastructure is the server.
FALSE
37
(T/F) The International Information Systems Security Certification Consortium (ISC)2, has two certifications: Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP). CISSP candidates must pass a difficult and comprehensive exam and have at least 5 years of professional information security experience.
TRUE
38
(T/F) Many organizations, after conducting a security assessment of their IT setup, never end up aligning policy definitions to gaps and exposures.
FALSE
39
(T/F) Organizations should start defining their IT security policy framework by defining an asset classification policy.
TRUE