Governance Flashcards

1
Q

IT Governance

A

A comprehensive security management framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Policy (Security)

A

*Defines the role of security inside of an organization
*Establishes the desired end state for that program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organizational Policy (Security)

A

*Meet business goals
*Define the roles, responsibilities, and terms associated with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System-specific Policy (Security)

A

Addresses the security o a specific technology, application, network, or computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Issue-specific Policy (Security)

A

Addresses a specific security issue *Email privacy,
*Employee termination procedures *Other specific issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standard (Sec Policy)

A

Implements a policy in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baseline (Sec Policy)

A

Creates a reference point in network architecture and design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guideline (Sec Policy)

A

Recommended action that allows for exceptions in unique situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedure (Sec Policy)

A

Detailed step-by step instructions to perform a give task or series of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Change Management

A

Structured way of changing the state of a computer system, network, or IT procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident Response Plan

A

Instructions to detect, respond to , and recover from security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Steps of an Incident Response Plan

A
  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Continuity Plan

A
  • How a business will continue operating during an unplanned disruption
  • Long-Term
  • Contains a Disaster Recovery Plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Life Cycle Plan

A

Describes the approach to maintaining an asset from creation to disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Planning

A

Planning and requirement analysis for a system, including architecture outlining risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standard Operating Procedure

A

Step-by-step instructions to carry out routine operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Memorandum of Understanding (MOU)

A

Non-binding agreement between two or more organization to detail what common actions they intend to take

17
Q

Service-Level Agreement (SLA)

A

Documents the quality, availability, and responsibilities agree upon by a service provider and a client

18
Q

Baseline Configuration

A

Set of specifications for
*Information system
*Configuration item within a system
That has been formally reviewed and agreed upon

19
Q

Physical Network Diagram

A

Shows the actual physical arrangement of network components

20
Q

Logical Network Diagram

A

Illustrates the flow of data across a network and how devices communicate with each other

21
Q

Wiring Diagram

A

Labels which cables are connected to which ports

22
Q

Radio Frequency (Wireless) Site Survey

A

Planning/designing a wireless network to deliver the required wireless solution

23
Q

Wired Site Survey

A

Determines if a site has the right amount of power, space, and cooling to support a new upgrade or installation

24
Q

Audit and Assessment Report

A

Delivered after a formal assessment has been conducted

25
Q

Sensor

A

Monitors a device’s temperature, CPU usage, and memory, which could indicate if it is operating properly or about to fail

26
Q

Minor Temperature Threshold

A

Set off an alert when a rise in temperature is detected but hasn’t reached dangerous levels

27
Q

Major Temperature Threshold

A

Used to set off an alarm when temperature reaches dangerous conditions

28
Q

Safe temperature range for network devices

A

between 50 and 90 F

29
Q

Network Availability

A

*How well a network can respond to connectivity and performance demands
*Measured as Uptime:
Time network was up ÷ time network was down in a monitoring period

30
Q

Mean Time to Repair (MTTR)

A

Average time it takes to repair a device

31
Q

Mean Time Between Failures (MTBF)

A

Average time between when failures occur on a device

32
Q

Cloud Site

A

Allows for the creation of a recovery version of an organization’s enterprise network in the cloud

33
Q

Recovery Time Objective (RTO)

A

Time and service level within which a business process must be restored to avoid unacceptable consequences

34
Q

Recovery Point Objective (RPO)

A

Time during a disruption before data lost exceeds the maximum allowable threshold or tolerance

35
Q

Full Backup

A

Complete backup of every single file on a machine

36
Q

Backs up data that changed since last backup

A

Incremental Backup

37
Q

Snapshot

A

Read-only copy of data frozen in time

38
Q

Power Distribution Unit (PDU)

A

Distributes electric power to rack of computers and networking equipment located in a data center

39
Q

Pre-Action System

A

A detector actuation like a smoke detector and sprinkler must be tripped prior to water being released

40
Q

Statement of Work (SOW)

A

A document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
(not on going like SLA)

41
Q

Policy vs. Standard

A
  • Policies are plans that describe the goal of an established procedure (Acceptable use, Physical Security, or VPN access)
  • Standards are the mechanisms implemented to achieve that goal. VPN and HTTPS are examples of protocols and industry standards.