IS3220 CHAPTER 6 Flashcards
Less rigorous than training or education this security training focuses on common or basic security elements that all employees must know and abide by. This is called ___?
AWARENESS
This process of making copies of data onto other storage media is called ___?
The purpose is to protect against data loss by having additional onsite or offsite copies of data that can be restored when necessary.
BACKUP
A plan to maintain the mission-critical functions of the organization in the event of a problem that threatens to take business processes offline is called ___?
The goal is to prevent the interruption of business tasks, even with a damaged environment and reduced resources.
BUSINESS CONTINUITY PLAN
A detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy and any applicable laws and regulations is called ___?
COMPLIANCE AUDIT
A security stance that blocks all access to all resources until a valid authorized explicit exemption is defined is called ___?
DEFAULT DENY
A security stance that allows all access to all resources until an explicit exception is defined is called ___?
DEFAULT PERMIT
A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event is called ___?
The goal of this is to return the business to functional operation within a limited time to prevent the failure of the organization to the incident.
DISASTER RECOVERY PLAN
The third and highest level of obtaining security knowledge that leads to career advancement is called ___?
This is broad and not necessarily focused on specific job tasks or assignments. More rigorous than awareness or training.
EDUCATION
A form of security protection that protects individual files by scrambling the contents in such a way as to render them unusable by unauthorized third parties is called ___?
FILE ENCRYPTION
A collection of multiple honey pots in a network for the purposes of luring and trapping hackers is called ___?
HONEYNET
A predefined procedure to react to security breaches to limit damage, contain the spread of malicious content, stop compromise of information, and promptly restore the environment to a normal state. This is called ___?
INCIDENT RESPONSE PLAN
The state or condition of an asset or process vitally important to the long-term existence and stability of an organization is called ___?
If this element is interrupted or removed, it often results in the failure of the organization.
MISSION-CRITICAL
Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?
PADDED CELL
The guideline that all users should be granted only the minimum level of access and permission required to perform their assigned job tasks and responsibilities is called ___?
PRINCIPLE OF LEAST PRIVILEGE
A security guideline, procedure, or recommendation manual is called ___?
SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS)
An administrative rule whereby no single individual possesses sufficient rights to perform certain actions is called ___?
Achieved by dividing administrative level tasks and powers among compartmentalized administrators.
SEPARATION OF DUTIES