IS3110 CHAP 11 Flashcards
A written policy created to ensure that user and computer accounts are managed securely. It identifies details for creating accounts, such as using a first name, last name format. It specifies what to do with unused accounts. It can also include requirements for account lockout and password policies. This written policy is usually enforced with a technical policy.
Account management policy
A philosophy applied to routers and firewalls. All traffic is blocked unless it is explicitly allowed.
Implicit deny
A technology that allows a load to be shared among multiple servers. As new clients connect, they are directed to the server that has the least load. It is used in Web farms.
Network load balancing
A written or technical policy that specifies security requirements for passwords. Requirements include length, age, and complexity.
Password policy
A method of increasing capability by adding additional servers to a service. Efficient techniques don’t require the modification of the core application.
Scale out
A method of increasing capability by adding additional resources to a server.
Scale up
A battery or bank of batteries used to provide immediate power to systems if power fails. This intended to provided short term power. This gives a system enough time to shut down gracefully, or switch over to a long term power source.
Uninterruptible power supply
A group of multiple servers used to host a single Web site. This allows a service to easily support more clients by just adding an additional server. If a server fails, clients will not be directed to the server. This provides a measure of fault tolerance.
Web farm
- A(n) ___ countermeasure has been approved and has a date for implementation.
In-place
- A single risk can be mitigated by more than one countermeasure.
TRUE OR FALSE
TRUE
- The formula for risk is Risk = ___.
Threat X Vulnerability
- What would an account management policy include?
A. Details on how to create accounts
B. Details on when accounts should be disable
C. Password policy
D. A and B only
E. All the above
Details on how to create accounts
Details on when accounts should be disable
Password policy
5. What could a password policy include? A. Length of password B. List of required passwords C. User profiles D. All the above
Length of password
- The ___ plan will include details on how and when to implement approved countermeasures.
Mitigation
7. You are reviewing a countermeasure to add to the mitigation plan. What costs should be considered? A. Initial purchase costs B. Facility costs C. Installation costs D. Training costs E. All the above
Initial purchase costs
Facility costs
Installation costs
Training costs