Domain 2 Flashcards

1
Q

Breach

A

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition or any similar occurrence where colon a person other than an authorized user accesses or potentially accesses personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business continuity

A

Actions processes and tools for ensuring an organization can continue critical operations during

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business continuity plan or BCP

A

The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business impact analysis or

A

An analysis of an information systems requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disaster Recovery or Dr

A

An information systems terms the activities necessary to restore it and communication services to an organization during an after an outage, disruption or disturbance of any kind or scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster Recovery plan or DRP

A

The processes policies and procedures related to preparing for Recovery or continuation of an organization’s critical business functions technology infrastructure systems and applications after the organization experiences a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Event

A

Any observable occurrence in a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

A particular attack. It is named this way because these attacks exploit system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident

A

An event that actually or potentially jeopardizes the confidentiality Integrity or availability of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident handling or incident response IR

A

The process of detecting and analyzing incidents to limit the incidence effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident response plan or IRP

A

The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious Cyber attack against an organization’s Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion

A

A security event or a combination of security events that constitutes a security incident in which an intruder gains or attempts to gain, access to a system or system resource without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security operations center

A

A centralized organizational function fulfilled by an information security team that monitors detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability

A

Weakness in an information system system security procedures, internal controls or implementation that could be exploited or triggered by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero day

A

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognize patterns, signatures or methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly