Chapter 18: Network Operations Flashcards
A ____ is a written document that defines how an organization will protect its IT infrastructure and includes acceptable use policies, network access policies, mobile deployment models, onboarding and offboarding policies, and externally imposed policies.
security policy
A/An ____ defines what is and what is not acceptable to do on an organization’s computing devices.
AUP or Acceptable Use Policy
The ____ defines who may access the network, how they may access the network, and what they can access.
network access policy
A/An ____ mobile deployment model lets employees use their existing portable devices at work.
BYOD or Bring Your Own Device
In a/an ____ deployment model, the corporation owns all the mobile devices and issues them to employees. The corporation is solely responsible for the maintenance of the devices, the applications, and the data. Nothing but company approved software is used on the issued mobile devices.
COBO or Corporate Owned, Business Only
In a/an ____ deployment model, the organization issues mobile devices and employees are presented with a whitelist of pre-approved applications that they may install.
COPE or Corporate Owned, Personally Enabled
An organization offering ____ options provides employees free choice within a catalog of mobile devices. The organization retains complete control and ownership over the mobile devices, although the employees can install their own apps on the mobile devices.
CYOD or Choose Your Own Device
____ is the process of confirming that mobile devices leaving the control of the organization do not store any proprietary applications or data.
Offboarding
____ is the process of verifying that new mobile devices appearing in the organization’s infrastructure are secure and safe to use within the organization.
Onboarding
The process of creating change in your infrastructure in an organized, controlled, and safe way is called ____.
change management
A/An ____ is a document between a customer and a service provider that defines the scope, quality, and terms of service to be provided. ____ requirements are a common part of business continuity and disaster recovery.
SLA or Service Level Agreement
SLA
A/An ____ is a document that defines an agreement between two parties in situations where a legal contract wouldn’t be appropriate. It defines the duties the parties commit to perform for each other and a time frame for the ____.
MOU or Memorandum Of Understanding
MOU
A/An ____ is a legal contract between a vendor and a customer that defines the services and products the vendor agrees to supply and the time frames in which to supply them.
SOW or Statement Of Work
A/An ____ is a legal document that prohibits the signer from disclosing any company secrets learned as part of his or her job.
NDA or Nondisclosure Agreement
A/An ____ is a person, organization, or even a nation state that has both the capability and intent to harm, steal, copy, or otherwise diminish an asset.
threat actor
A/An ____ will inspect a huge number of potential vulnerabilities and create a report for an organization to then act upon.
vulnerability scanner