IS3340 CHAPTER 10 Flashcards

1
Q

The components, including people, information, and conditions, that support business objectives is called ___?

A

BUSINESS DRIVERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of ensuring that the items in each domain of the IT infrastructure meet or exceed security goals is called ___?

A

COMPLIANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A quality method indicating a continuous process consisting of four repeating steps and is known as ___ or ____? (PDCA)

A

DEMING CYCLE/PLAN-DO-CHECK-ACT (PDCA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ongoing attention and care an organization places on security and compliance is called ___?

A

DUE DILIGENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns is called ___?

A

INTRUSION DETECTION SYSTEM (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns and can also change firewall rules in real time to prevent further damage from an attack is called ___?

A

INTRUSION PREVENTION SYSTEM (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A shortened unique string of digits that represents a file or message is called ___?

A

MESSAGE DIGEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of implementing the security controls within the IT infrastructure is called ___?

A

SECURITY ADMINISTRATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Security administration is the process of developing an organization’s security policy.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is the most important feature of PDCA?
  2. PDCA was developed for security administration
  3. PDCAis a Microsoft standard
  4. PDCA repeats and does not end
  5. PDCA was developed by Dr. Deming
A

PDCA repeats and does not end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. which of the following activities would a security administrator be LEAST likely to do?
  2. Monitor log files
  3. Deliver AUP training
  4. Keep software up to date
  5. Enforce physical security controls
A

Deliver AUP training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. If time to recover exceeds the recovery goal, which property of security have you violated?
  2. Availability
  3. Integrity
  4. Confidentiality
  5. Consistency
A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following devices or software programs can detect intrusions? (Select two)
  2. Firewall
  3. IDS
  4. IPS
  5. NAT
A

IDS

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A valid backup is an integral part of your ___ and ___.
A

Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Protecting both integrity and confidentiality depend largely on knowing a user’s identity.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A DACL is used primarily to enforce which security properties? (Select two)
  2. Integrity
  3. Consistency
  4. Confidentiality
  5. Availability
A

Integrity

Confidentiality

17
Q
  1. You can use the ___ tool to ensure your Microsoft operating system is up to date and has all patches and service packs installed.
A

MBDA

18
Q
  1. Active directory requires that you create multiple GPOs, one for each computer.
    TRUE OR FALSE
A

FALSE

19
Q
  1. Which of the following terms is best described as a collection of requirements users must meet, typically within a specific system or environment?
  2. Security policy
  3. Security standard
  4. Security procedure
  5. Security guideline
A

Security standard

20
Q
  1. Which type of Windows component would you use to define which users can create files in a folder?
  2. DACL
  3. NAT
  4. User right
  5. IPSec rule
A

DACL

21
Q
  1. Which tool would you sue to edit the setting that disables user-installed desktop gadgets for all users?
  2. Local Group Policy Editor
  3. MBSA
  4. GPMC
  5. Performance Monitor
A

GPMC

22
Q
  1. Microsoft provides a command line utility for creating backups on Windows Server 2008 and Windows 7.
    TRUE OR FALSE
A

TRUE