IS3110 CHAP 11 Flashcards

1
Q

A written policy created to ensure that user and computer accounts are managed securely. It identifies details for creating accounts, such as using a first name, last name format. It specifies what to do with unused accounts. It can also include requirements for account lockout and password policies. This written policy is usually enforced with a technical policy.

A

Account management policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A philosophy applied to routers and firewalls. All traffic is blocked unless it is explicitly allowed.

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technology that allows a load to be shared among multiple servers. As new clients connect, they are directed to the server that has the least load. It is used in Web farms.

A

Network load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A written or technical policy that specifies security requirements for passwords. Requirements include length, age, and complexity.

A

Password policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A method of increasing capability by adding additional servers to a service. Efficient techniques don’t require the modification of the core application.

A

Scale out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method of increasing capability by adding additional resources to a server.

A

Scale up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A battery or bank of batteries used to provide immediate power to systems if power fails. This intended to provided short term power. This gives a system enough time to shut down gracefully, or switch over to a long term power source.

A

Uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A group of multiple servers used to host a single Web site. This allows a service to easily support more clients by just adding an additional server. If a server fails, clients will not be directed to the server. This provides a measure of fault tolerance.

A

Web farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A(n) ___ countermeasure has been approved and has a date for implementation.
A

In-place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A single risk can be mitigated by more than one countermeasure.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The formula for risk is Risk = ___.
A

Threat X Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What would an account management policy include?
    A. Details on how to create accounts
    B. Details on when accounts should be disable
    C. Password policy
    D. A and B only
    E. All the above
A

Details on how to create accounts
Details on when accounts should be disable
Password policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
5. What could a password policy include?
A. Length of password
B. List of required passwords
C. User profiles
D. All the above
A

Length of password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The ___ plan will include details on how and when to implement approved countermeasures.
A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
7. You are reviewing a countermeasure to add to the mitigation plan.  What costs should be considered?
A. Initial purchase costs
B. Facility costs
C. Installation costs
D. Training costs
E. All the above
A

Initial purchase costs
Facility costs
Installation costs
Training costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
8. Which of the following are considered facility costs for the implementation of a countermeasure?
A. Installation and air condition
B. Installation and training
C. Power and air conditioning 
D. Power and training
A

Power and air conditioning

17
Q
9. An account management policy needs to be created as a mitigation countermeasure.  You will write the policy.  What is a reasonable amount of time for this to be completed and approved?
A. 20 minutes
B. One day
C. One month
D. One year
A

One month

18
Q
10. What can you use to determine the priority of countermeasures?
A. Cost benefit analysis
B. Threat/vulnerability matrix
C. Disaster recovery plan
D. Best guess method
A

Threat/vulnerability matrix

19
Q
11. A risk assessment was complete three months ago.  It has recently been approved, and you are tasked with implementing a mitigation plan.  What should you do first?
A. Verify risk elements
B. Purchase countermeasures
C. Redo risk assessment
D. Redo the CBA
A

Verify risk elements

20
Q
12. You are evaluating two possible countermeasures to mitigate the risk.  Management only wants to purchase one.  What can you use to determine which countermeasure provides the best cost benefits?
A. Threat/Vulnerability matrix
B. Threat/vulnerability score
C. CBA
D. CIA
A

CBA

21
Q
  1. You are performing a cost benefit analysis. You want to determine if a countermeasure should be used. Which of the following formulas should you use?
    A. Loss before countermeasure - Loss after countermeasure
    B. Loss after countermeasure - Loss before countermeasure
    C. Projected benefits - Cost of countermeasure
    D. Cost of countermeasure - Projected benefits
A

Projected benefits - Cost of countermeasure

22
Q
14. Of the following, what should be included in a cost-benefit analysis report?
A. Recommended countermeasure
B. Risk to be mitigated
C. Costs
D. Annual projected benefits
E. A and C only
F. All the above
A

Recommended countermeasure
Risk to be mitigated
Costs
Annual projected benefits

23
Q
  1. A POAM can be used to follow up on a risk mitigation plan.
    TRUE OR FALSE
A

TRUE