ias_20250325113745 Flashcards

1
Q
  • main goal is to restore normal modes of operation with minimal
    cost and disruption to normal business activities
    after an adverse event
A

CONTIGENCY PLANNING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • systematic process to determine and
    evaluate the potential effects of an
    interruption to critical business operations
  • helps the organization determine which
    business functions and information systems
    are the most critical to the success of the
    organization.
A

BUSINESS IMPACT ANALYSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

maximum amount of time that a system
resource can remain unavailable

A

RECOVERY TIME OBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • point in time before a disruption or system
    outage to which business process data can
    be recovered
A

RECOVERY POINT OBJECTIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • total amount of time the system owner or
    authorizing official is willing to accept for a
    business process outage or disruption.
A

MAXIMUM TOLERABLE DOWNTIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

amount of effort (expressed as elapsed time)
needed to make business functions work
again after the technology element is
recovered.

A

WORK RECOVERY TIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • focuses on the immediate response to an
    incident.
A

INCIDENT RESPONSE PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

detailed step-by-step methods of preparing,
detecting, reacting to, and recovering from
an incident.
* During the incident - planners develop and
document the procedures that must be
performed during the incident.
* After the incident - must be performed
immediately after the incident has ceased.
* Before the incident — draft a third set of
procedures

A

IR PROCEDURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Recognition that an incident is
under way

A

Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Responding to the incident in a
predetermined fashion to contain and
mitigate its potential damage

A

Reaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

— Returning all systems and data
to their state before the incident

A

3Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A combination of
on-site and off-site tape-drive, hard-drive,
and cloud backup methods

A

Traditional Data Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

—transfers data in bulk
batches to an off-site facility

A

Electronic Vaulting—

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

transfers only
transaction data in near real time to an offsite facility.

A

Remote Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

transfers duplicate
online transaction data and duplicate
databases to a remote site on a redundant
server

A

Database Shadowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

recommends the creation of at least three
copies of critical data (the original and two
copies)

A

3-2-1 BACKUP RULE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • events represent the potential for loss, they
    are referred to as adverse events.
A

INCIDENT CANDIDATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

adverse event that could result in a loss of
information assets

A

INCIDENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • composed of technical IT, managerial IT, and
    InfoSec professionals who are prepared to
    detect, react to, and recover from an incident;
    may include members of the IRPT.
A

COMPUTER SECURITY INCIDENT RESPONSE
TEAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

— Relates to risk management and
governance

A

Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Relates to implementation of
effective security controls (policy, education,
training and awareness, and technology)

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Relates to the identification of
adverse events

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Relates to reacting to an incident

A

Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Relates to putting things “as they
were before” the incident

A

Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

organization’s set of planning and
preparation efforts for detecting, reacting to,
and recovering from a disaster.

A

DISASTER RECOVERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

which focuses on restoring operations at the
primary site

A

DISASTER RECOVERY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

policy document that guides the
development and implementation of DR
plans and the formulation and performance
of DR teams.

A

DISASTER RECOVERY POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DISASTER CLASSIFICATION

A
  • Fire
  • Flood
  • Earthquake
  • Lightning
  • Electrostatic Discharge (ESD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • ensures that critical business functions can
    continue if a disaster occurs.
A

BUSINESS CONTINUITY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CONTINUITY STRATEGIES

A

Hot Site Cold Site Warm Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Real-time data synchronization.
Most Expensive

32
Q

No data backup and No data
synchronization. Least Expensive

33
Q

Data is synchronized daily or
weekly. Cost Effective

34
Q

collects information about the organization
and the threats it faces
* consists of a coordinating executive,
representatives from major business units,
and the managers responsible for each of the
other three teams.
* It should include the following personnel:
* Champion—high-level manager
(COO/CEO/PRESIDENT)
* Project manager—mid-level operations
manager

A

CONTIGENCY PLANNING MANAGEMENT TEAM

35
Q

The team responsible for IR plan -
organization’s preparation, reaction, and
recovery from incident

A

Incident Response Planning Team (IRPT)

36
Q

The team responsible for DR plan -
organization’s preparation, response, and
recovery from disasters

A

Disaster Recovery Planning Team (DRPT)

37
Q

The team responsible for BC plan -
establishing primary operations at an
alternate site until the disaster recovery
planning team can recover the primary site

A

Business Continuity Planning Team (BCPT)

38
Q

assigned
to develop and implement the CM plan.

A

Crisis Management Planning Team (CMPT)

39
Q
  • Focuses on the effects that a disaster has on
    people than its effects on other assets.
A

CRISIS MANAGEMENT

40
Q

systems determine whether and how to
admit a user into a trusted area of the
organization

A

ACCESS CONTROL

41
Q

provide the ability to share resources in a
peer-to-peer configuration, which allows
users to control and possibly provide access
to information or resources at their disposal.

A

DISCRETIONARY ACCESS CONTROLS (DACS)

42
Q

are managed by a central authority in the
organization.

A

NONDISCRETIONARY ACCESS CONTROLS
(NDACS)

43
Q

users are assigned a matrix of authorizations
for particular areas of access.

A

LATTICE-BASED ACCESS CONTROL (LBAC)

44
Q

position or temporary assignment like project
manager

A

ROLE-BASED ACCESS CONTROLS (RBACS

45
Q

are tied to a particular chore or responsibility
such as a department’s printer administrator

A

TASK-BASED ACCESS CONTROLS (TBACS)

46
Q

use data classification schemes; they give
users and data owners limited control over
access to information resources.

A

MANDATORY ACCESS CONTROLS (MACS)

47
Q

grants or denies access to resources based
on attributes of the user, the resource, and
the environment

A

ATTRIBUTE-BASED ACCESS CONTROLS
(ABACS)

48
Q

unverified or unauthenticated entities who
seek access to a resource provide a unique
label by which they are known to the system.
* I am a user of the system.

A

IDENTIFICATION

49
Q
  • process of validating an unauthenticated
    entity’s purported identity.
  • I can prove I’m a user of the system.
  • Something you know, Something you have,
    Something you are
A

AUTHENTICATION

50
Q

involves confirming that a person or
automated entity is approved to use an
information asset by matching them to a
database

A

AUTHORIZATION

51
Q

also known as auditability
* every action performed on a computer
system or using an information asset can be
associated with an authorized user or
system.

A

ACCOUNTABILITY

52
Q
  • information security program that it prevents specific types of information from moving between two different
    levels of networks,
  • software service running on an existing
    router or server
53
Q
  • examines the header information of data
    packets that come into a network.
  • scan network data packets looking for
    compliance with the rules of the firewall’s
    database or violations of those rules.
A

PACKET-FILTERING FIREWALL

54
Q

requires the configuration rules to be manually created,
sequenced, and modified within the firewall.

A

Static Packet Filtering

55
Q

can react to
network traffic and create or modify its
configuration rules to adapt.

A

Dynamic Packet Filtering

56
Q

keeps
track of each network connection between
internal and external systems using a state
table and that expedites the filtering of those
communications.

A

Stateful Packet Inspection (SPI)

57
Q
  • is frequently installed on a dedicated
    computer separate from the filtering router,
    but it is commonly used in conjunction with a
    filtering router.
A

APPLICATION LAYER PROXY FIREWALLS

58
Q

designed to operate at the media access
control sublayer of the network’s data link
layer (Layer 2).

A

MEDIA ACCESS CONTROL LAYER FIREWALLS

59
Q

combine the elements of other types of
firewalls—that is, the elements of packetfiltering, application layer proxy, and media
access control layer firewalls.

A

HYBRID FIREWALLS

60
Q

All firewall devices can be configured in
several network connection architectures

A

FIREWALL ARCHITECTURES

61
Q
  • An architecture can be implemented as a
    packet-filtering router, or it could be a firewall
    behind a router that is not configured for
    packet filtering.
A

SINGLE BASTION HOSTS

62
Q
  • A networking scheme in which multiple real,
    routable external IP addresses are converted
    to special ranges of internal IP addresses,
    usually on a one-to-one basis; that is, one
    external valid address directly maps to one
    assigned internal address.
A

Network Address Translation (NAT)

63
Q

combines the packet-filtering router with a
separate, dedicated firewall

A

SCREENED HOST ARCHITECTURE

64
Q

The dominant architecture today used with a DMZ.

A

SCREENED SUBNET ARCHITECTURE (WITH
DMZ)

65
Q

Firewalls operate by examining a data packet
and performing a comparison with some
predetermined logical rules.

A

FIREWALL RULES

66
Q

is another utility that can help protect an
organization’s systems from misuse and
unintentional denial-of-service problems.

A

CONTENT FILTER

67
Q

The connections between company
networks and the Internet use firewalls to
safeguard that interface.

A

REMOTE ACCESS

68
Q
  • is a technology that enables the creation of a
    secure and encrypted connection between
    your device and the internet.
A

VIRTUAL PRIVATE NETWORKS (VPNS)

69
Q

also known as a legacy VPN, uses leased
circuits from a service provider and conducts
packet switching over these leased circuits.

A

TRUSTED VPN

70
Q

use security protocols like IPSec to encrypt
traffic transmitted across unsecured public
networks like the Internet.

A

SECURE VPNS

71
Q
  • combines the trusted and secure
    technologies, providing encrypted
    transmissions (as in secure VPN) over some
    or all of a trusted VPN network.
A

HYBRID VPN

72
Q

of incoming and outgoing data, in which the
native protocol of the client is embedded
within the frames of a protocol that can be
routed over the public network and be usable
by the server network environment.

A

ENCAPSULATION

73
Q
  • of incoming and outgoing data to keep the
    data contents private while in transit over the
    public network, but usable by the client and
    server computers and/or the local networks
    on both ends of the VPN connection.
A

ENCRYPTION

74
Q

of the remote computer and perhaps the
remote user as well. Authentication and
subsequent user authorization to perform
specific actions are predicated on accurate
and reliable identification of the remote
system and user

A

AUTHENTICATION

75
Q

the data within an IP packet is encrypted, but
the header information is not.

A

TRANSPORT MODE

76
Q
  • establishes two perimeter tunnel servers to
    encrypt all traffic that will traverse an
    unsecured network.
A

TUNNEL MODE