Information Technology and Security Flashcards

1
Q

Reasonableness

A

Data validation that considers reliability, validity, and duplicates and identifies them for additional scrutiny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False Reject Rate

A

Want a higher False Reject Rate to protect data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Best way to prevent internal attacks

A

Security awareness training for all who have access to internal resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Employee Owned Devices

A

Greatest risk to business functions and enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Awareness Training

A

Prevent Internal Threats
Reduce social engineering attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sings of effective incident response and security awareness

A

Increased reporting of security events.
Increase number of violation reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Management

A

Establishing baselines for hardware, software, and internally developed systems.
Images are managed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Change Management

A

Comprises of the overall governance framework and serves the configuration, release and management issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident Response Process

A

Detection-identify cause.
Response-limit impact.
Mitigation-remediation
Recovery-full repair of event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Indicates the readiness and preparedness of the enterprise to handle unexpected events

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SDLC

A

Plan (Initiation)-Begin security, implement internal controls.
Development-security is identified.
Implementation-security is configured and tested.
Operation-maintaining acceptable level security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Test ensuring adequate quality, ensures system can be recovered and meets load requirements.

A

User Acceptance Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unauthorized Disclosure of Sensitive Data

A

Data Leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly