Explaining Organizationals And Physical Security Concepts Flashcards

1
Q

Settings for services and policy configuration for a network appliance or for a server operating in a particular application role (web server, mail server, file/print server and so on)

A

Configuration Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process for approving, preparing , supporting and a managing new or updated business processes or technologies

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Documentation of best practice and work instructions to use to perform a common administrative task.

A

Standard operating procedure (SOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detailed and specific evaluation of a process, procedure, organization, job function or system in which results are gathered and reported to ensure that the target of the audit is in compliance with the organizations policies, regulations and legal responsibilities

A

Audit reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Controlled acquisition deployment use and decommissioning of assets.

A

System life cycle roadmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Documentation detailing site premises using an accurate scale

A

floor plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Documentation of connector pin outs and/or cable runs

A

Wiring diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive wiring panel providing a central termination point for cabling. It distributes backbone or vertical wiring through a building and connections to external access provider networks.

A

Main distribution frame (MDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive wiring panel providing a central termination point for cabling. An IDF is an optional layer of distribution frame hierarchy that cross-connects vertical backbone cabling to an MDF to horizontal wiring to wall ports on each floor of a building or each building of a campus network

A

Intermediate distribution frame (IDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Storage solution for server and network equipment. Racks are designed to a standard width and height (measured in multiples of 1U or 1.75”). Racks offer better density, cooling and security than ordinary office furniture.

A

Rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Procedures and guidelines covering appropriate priorities, actions and responsibilities in the event of security incidents divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

A

Incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Documented and resources plan showing actions and responsibilities to be used in response to critical incidents

A

Disaster recovery plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Collection of processes and resources that enable an organization to maintain normal business operations in the face of some adverse event.

A

Business continuity plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process of bringing in a new employee, contractor or supplier

A

Onboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process of ensuring that all HR and other requirements are covered when an employee leaves an organization. Also called an exit interview.

A

Offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security policy that promotes user selection of strong passwords by specifying a minimum password length, requiring complex passwords, requiring periodic password changes and placing limits on reuse of passwords

A

Password policy

17
Q

Policy that governs employees’ use of company equipment and internet services. ISPs may also apply AUPs to their customers. Also called fair use policy.

A

Acceptable use policy (AUP)

18
Q

Software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

A

Data loss prevention (DLP)

19
Q

Agreement that sets the service requirements and expectations between a consumer and a provider

A

Service level agreement (SLA)

20
Q

Agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties

A

Non disclosure agreement (NDA)

21
Q

Usually a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve the exchange of money.

A

Memorandum of understanding (MOU)

22
Q

Authentication mechanism that allows a user to present a smart card to operate an entry system

A

Badge reader

23
Q

Authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint patter and signature recognition.

A

Biometric

24
Q

Secure entry system with two gateways, only one of which is open at any one time. Previously known as mantrap though this terminology is now deprecated.

A

Access control vestibule