IS3230 CHAPTER 2 Flashcards

1
Q

The number of times per year we can expect a compromise to occur is called ___.

A

ANNUAL RATE OF OCCURRENCE (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The total cost per year of the threat under assessment. ALE is calculated by multiplying the SLE by the ARO.

A

ANNUALIZED LOSS EXPECTANCY (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The relative value, either in monetary terms or in overall impact, of the resource being protected by the access control system is called.

A

ASSET VALUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What it costs an organization to obtain or create an asset originally is called ___.

A

COST OF ATTAINMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What an organization would lose if an asset were unavailable. Ex: The organization might lose $50,000 per hour in lost productivity if its internal network went down.

A

COST OF IMPACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What it would cost an organization to replace an asset if it were stolen or compromised is called ___.

A

COST OF REPLACEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An action taken to counter another action is called ___.

A

COUNTERMEASURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The approach of using multiple layers of security to protect against a single point of failure is called ___.

A

DEFENSE-IN-DEPTH STRATEGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability of an attacker to log into a system under one level of access and exploit a vulnerability to gain a higher level of access is called ___.

A

HEIGHTENED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A problem-solving system that uses a set of rules to select the best answer available. In virus scanning, ___ refers to an algorithm that uses a set of rules that is constantly revised based on feedback to determine whether a given file contains a virus.

A

HEURISTICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A combination of hardware and software used to analyze network traffic passing through a single point on the network. It is designed to analyze traffic patterns to find suspicious activity is called ___.

A

INTRUSION DETECTION SYSTEM (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A combination of a firewall and an IDS. An ___ is designed to analyze network traffic patterns and react in real time to block suspicious activity.

A

INTRUSION PREVENTION SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used to create secure pathways for data through a public network is called ___.

A

IP TUNNELING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network connecting computers and other assets in a small, physical location such as an office, home, or school is called ___.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The combination of more than one access control method to secure a single resource is called ___.

A

MULTILAYERED ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Guessing or deciphering passwords is called ___.

A

PASSWORD CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Creating legitimate-looking Web sites or emails that trick a user into entering sensitive information such as passwords, Social Security numbers, or credit card numbers is called ___.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The likelihood that an attack will occur is called ___.

A

PROBABILITY OF OCCURRENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A method of risk assessment that assigns a subjective label (usually “high”, “medium”, and “low” to a risk scenario is called ___.

A

QUALITATIVE RISK ASSESSMENTS

20
Q

A method of risk assessment that assigns a dollar value to every data point is called ___.

A

QUANTITATIVE RISK ASSESSMENTS

21
Q

The probability that a particular threat will exploit an IT vulnerability causing harm to an organization is called ___. It is measured in terms of probability and consequence.

A

RISK

22
Q

The process of identifying and prioritizing risk is called ___.

A

RISK ASSESSMENT

23
Q

The cost incurred in one loss incident is called ___.

A

SINGLE LOSS EXPECTANCY (SLE)

24
Q

An ID badge or other card with an embedded RFID chip that stores basic identification and authentication information is called ___.

A

SMART CARD

25
Q

The use of manipulation or trickery to convince authorized users to perform actions or divulge sensitive information to an attacker is called ___.

A

SOCIAL ENGINEERING

26
Q

An attack targeted at specific, usually high-level, individuals within an organization is called ___.

A

SPEAR PHISHING

27
Q

A potential attack on a system is called a ___.

A

THREAT

28
Q

A system that uses a public network (usually the Internet) to transmit private data securely. Users on a ___ can exchange data and share resources as if they were directly connected via a LAN.

A

VIRTUAL PRIVATE NETWORK (VPN)

29
Q

Allows network managers to segment resources into local area networks despite geographical distance. EX: if a work group’s office space was reallocated and the individuals in the group were reassigned to new offices spread across the building, a ___ could be created to allow them the same resource sharing abilities they had when their offices were located in a geographically small area.

A

VIRTUAL LOCAL AREA NETWORK (VLAN)

30
Q

An unintended weakness in a system’s design that makes it possible for attackers to take control of a system, access resources to which they are not authorized, or damage the system in some way is called ___.

A

VULNERABILITY

31
Q

A network that connects several smaller networks. EX: a large corporation with offices in New York, Chicago, and Los Angeles might have a LAN in each local office, and then connect those three LANs via a ___.

A

WIDE AREA NETWORK (WAN)

32
Q
  1. Risk is measured in terms of ___ and impact.
A

Probability of occurrence

33
Q
  1. Risk assessment is the first step in designing any access control system.
    TRUE OR FALSE
A

TRUE

34
Q
  1. The two types of risk assessments are qualitative and ___.
A

Quantitative

35
Q
  1. Vulnerabilities and threats are synonymous.

TRUE OR FALSE

A

FALSE

36
Q
  1. A vulnerability is a weakness purposely designed into the system.
    TRUE OR FALSE
A

FALSE

37
Q
  1. You should consider probability of occurrence in order to prioritize limited time and resources.
    TRUE OR FALSE
A

FALSE

38
Q
  1. What are the three primary threats to any access control system?
  2. Password cracking
  3. Heightened access
  4. Social engineering
  5. Forgotten passwords
A

Password cracking
Heightened access
Social engineering

39
Q
  1. A strong password that would take an attacker 10 years to crack in 1990 would take 10 years to crack today.
    TRUE OR FALSE
A

FALSE

40
Q
  1. As long as users choose strong, secure passwords, how those passwords are stored is irrelevant.
    TRUE OR FALSE
A

FALSE

41
Q
  1. Insecure applications run as the administrative user are the most common heightened access vulnerability.
    TRUE OR FALSE
A

TRUE

42
Q
  1. You should weigh the value of the assets and their relative risk level against the cost and inconvenience of the access control.
    TRUE OR FALSE
A

TRUE

43
Q
  1. You calculate ALE by multiplying SLE by 12.

TRUE OR FALSE

A

FALSE

44
Q
  1. You should install every patch that is released for the applications running in your environment.
    TRUE OR FALSE
A

FALSE

45
Q
  1. Calculate the ALE of a threat that can be expected to occur three times per year, and will cost the organization $50,000 per incident.
    ___.
A

$150,00

46
Q
  1. Calculate the ARO of a threat with an SLE of $100,000 and an ALE of $200,000.
A

Annual Rate of Occurrence (ARO)=2

47
Q
  1. Calculate the SLE of a threat with an ARO of 4 and an ALE of $100,000.
A

$25,000