IS4550 CHAPTER 15 Flashcards
A formal process that controls changes to systems. It ensures changes have minimal impact on operations and is called ___.
CHANGE MANAGEMENT
A collection of activities that track system configuration. It starts with a baseline and continues through a system’s life cycle including changing and monitoring is called ___.
CONFIGURATION MANAGEMENT (CM)
A standard image mandated for use on all systems running Window XP or Vista in any federal agency. This image locks down the operating system with specific security setting is called ___.
FEDERAL DESKTOP CORE CONFIGURATION (FDCC)
An automated management tool used in Microsoft domains. Administrators can configure a setting one time and it will apply to multiple users and computers is called ___.
GROUP POLICY
A technology used to create baselines of systems. It is captured from a source computer then can be deployed to other systems. Images include the operating system, applications, configuration settings, and security settings is called ___.
IMAGING
A group of specifications that standardize how security software products measure, evaluate, and report compliance and is called ___.
SECURITY CONTENT AUTOMATION PROTOCOL (SCAP)
A protocol used to query and manage network devices. V1 had known vulnerabilities such as transmitting the community name in clear text. V2 and V3 improved security and performance and is called ___.
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
.A set of standards and technologies used to query and manage systems and applications in a network. It is used on the Internet and on internal networks and is called ___.
WEB-BASED ENTERPRISE MANAGEMENT (WBEM)
Microsoft’s implementation of WBEM. It is a specification defining how to query and manage Microsoft clients and servers is called ___.
WINDOW MANAGEMENT INSTRUMENTATION (WMI)
- A ___ is a starting point or standard. Within IT, it provides a standard focused on a specific technology used within and organization.
Baseline
- An operating system and different applications are installed on a system. The system is then locked down with various setting. You want the same operating system, applications, and settings deployed to 50 other computers. What is the easiest way?
- Scripting
- Imaging
- Manually
- Spread the work among different departments
Imaging
- After a set of security settings has been applied to a system, there is no need to recheck these settings on the system.
TRUE OR FALSE
FALSE
- The time between when a new vulnerability is discovered and when software developers start writing a patch is known as a ___.
Vulnerability window or security gap
- Your organization wants to automate the distribution of security policy settings. What should be considered?
- Training of administrators
- Organizational acceptance
- Testing for effectiveness
- All the above
Training of administrators
Organizational acceptance
Testing for effectiveness
- Several tools are available to automate the deployment of security policy settings. Some tools can deeply baseline setting. Other tools can deploy changes in security policy settings.
TRUE OR FALSE
TRUE