IS4550 CHAPTER 15 Flashcards
A formal process that controls changes to systems. It ensures changes have minimal impact on operations and is called ___.
CHANGE MANAGEMENT
A collection of activities that track system configuration. It starts with a baseline and continues through a system’s life cycle including changing and monitoring is called ___.
CONFIGURATION MANAGEMENT (CM)
A standard image mandated for use on all systems running Window XP or Vista in any federal agency. This image locks down the operating system with specific security setting is called ___.
FEDERAL DESKTOP CORE CONFIGURATION (FDCC)
An automated management tool used in Microsoft domains. Administrators can configure a setting one time and it will apply to multiple users and computers is called ___.
GROUP POLICY
A technology used to create baselines of systems. It is captured from a source computer then can be deployed to other systems. Images include the operating system, applications, configuration settings, and security settings is called ___.
IMAGING
A group of specifications that standardize how security software products measure, evaluate, and report compliance and is called ___.
SECURITY CONTENT AUTOMATION PROTOCOL (SCAP)
A protocol used to query and manage network devices. V1 had known vulnerabilities such as transmitting the community name in clear text. V2 and V3 improved security and performance and is called ___.
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
.A set of standards and technologies used to query and manage systems and applications in a network. It is used on the Internet and on internal networks and is called ___.
WEB-BASED ENTERPRISE MANAGEMENT (WBEM)
Microsoft’s implementation of WBEM. It is a specification defining how to query and manage Microsoft clients and servers is called ___.
WINDOW MANAGEMENT INSTRUMENTATION (WMI)
- A ___ is a starting point or standard. Within IT, it provides a standard focused on a specific technology used within and organization.
Baseline
- An operating system and different applications are installed on a system. The system is then locked down with various setting. You want the same operating system, applications, and settings deployed to 50 other computers. What is the easiest way?
- Scripting
- Imaging
- Manually
- Spread the work among different departments
Imaging
- After a set of security settings has been applied to a system, there is no need to recheck these settings on the system.
TRUE OR FALSE
FALSE
- The time between when a new vulnerability is discovered and when software developers start writing a patch is known as a ___.
Vulnerability window or security gap
- Your organization wants to automate the distribution of security policy settings. What should be considered?
- Training of administrators
- Organizational acceptance
- Testing for effectiveness
- All the above
Training of administrators
Organizational acceptance
Testing for effectiveness
- Several tools are available to automate the deployment of security policy settings. Some tools can deeply baseline setting. Other tools can deploy changes in security policy settings.
TRUE OR FALSE
TRUE
- An organization uses a decentralized IT model with a central IT department for core services and security. The organization wants to ensure that each department is complying with primary security requirements. What can be used to verify compliance?
- Group policy
- Centralized change management policies
- Centralized configuration management policies
- Random audits
Random audits
- Change requests are tracked in a control work order database. Approved changes are also recorded in a CMDB.
TRUE OR FALSE
TRUE
- An organization wants to maintain a database of system settings. The database should include the original system settings and any changes. What should be implemented within the organization?
- Change management
- Configuration management
- Full ITIL life cycle support
- Security Content automation Protocol
Configuration management
- An organization wants to reduce the possibility of outages when changes are implanted on the network. What should the organization use?
- Change management
- Configuration management
- Configuration management database
- Simple Network Management Protocol
Change management
- Which NIST standard was developed for different scanning and vulnerability assessment tools, and comprises six specifications including XCCDF?
- SNMP
- WBEM
- SCAP
- WMI
SCAP
- Microsoft created the Web-Based Enterprise Management (WBEM) technologies for Microsoft products.
TRUE OR FALSE
FALSE
- Which of the following specifications is used exclusively in Microsoft products to query and configure systems in the network?
- WMI
- WBEM
- SNMP
- SCAP
WMI
- Which of the following is used to manage and query network devices such as routers and switches?
- WMI
- WBEM
- SNMP
- SCAP
SNMP
- A ___ can be used with a downloaded file. It offers verification that the file was provided by a specific entity. It also verifies the file has not been modified.
Digital signature