IS3340 CHAPTER 10 Flashcards
The components, including people, information, and conditions, that support business objectives is called ___?
BUSINESS DRIVERS
The process of ensuring that the items in each domain of the IT infrastructure meet or exceed security goals is called ___?
COMPLIANCE
A quality method indicating a continuous process consisting of four repeating steps and is known as ___ or ____? (PDCA)
DEMING CYCLE/PLAN-DO-CHECK-ACT (PDCA)
The ongoing attention and care an organization places on security and compliance is called ___?
DUE DILIGENCE
A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns is called ___?
INTRUSION DETECTION SYSTEM (IDS)
A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns and can also change firewall rules in real time to prevent further damage from an attack is called ___?
INTRUSION PREVENTION SYSTEM (IPS)
A shortened unique string of digits that represents a file or message is called ___?
MESSAGE DIGEST
The process of implementing the security controls within the IT infrastructure is called ___?
SECURITY ADMINISTRATION
- Security administration is the process of developing an organization’s security policy.
TRUE OR FALSE
FALSE
- What is the most important feature of PDCA?
- PDCA was developed for security administration
- PDCAis a Microsoft standard
- PDCA repeats and does not end
- PDCA was developed by Dr. Deming
PDCA repeats and does not end
- which of the following activities would a security administrator be LEAST likely to do?
- Monitor log files
- Deliver AUP training
- Keep software up to date
- Enforce physical security controls
Deliver AUP training
- If time to recover exceeds the recovery goal, which property of security have you violated?
- Availability
- Integrity
- Confidentiality
- Consistency
Availability
- Which of the following devices or software programs can detect intrusions? (Select two)
- Firewall
- IDS
- IPS
- NAT
IDS
IPS
- A valid backup is an integral part of your ___ and ___.
Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
- Protecting both integrity and confidentiality depend largely on knowing a user’s identity.
TRUE OR FALSE
TRUE