IS4550 CHAPTER 4 Flashcards
Generally any business software that an end user (including customers) touches is considered an application is called ___.
APPLICATION SOFTWARE
A formal program that reduces the likelihood of accidental or malicious loss of data is called ___.
DATA LEAKAGE PROTECTION (DLP)
A formal program that reduces the likelihood of accidental or malicious loss of data is called ___.
DATA LOSS PROTECTION (DLP)
In the context of workstation central management systems, refers to processes that determine what is installed on a workstation; it could also refer to knowing what information sits on a workstation is called ___.
DISCOVERY MANAGEMENT
A logical piece of our technology infrastructure with similar risks and business requirements is called ___.
DOMAIN
A policy that discusses what is acceptable when using the company email system is called ___.
EMAIL POLICY
A protocol used to exchange files over a LAN or WAN is called ___.
FILE TRANSFER PROTOCOL (FTP)
A device that filters the traffic in and out of a LAN is called ___.
FIREWALL
A network with little or no controls that limit network traffic is called ___.
FLAT NETWORK
In the context of workstation central management systems, provides support to the end user is called ___.
HELP DESK MANAGEMENT
Used to connect multiple devices within a local area network. it has ports and as the traffic flows through the device, the traffic is duplicated so all ports can see the traffic is called ___.
HUB
In the context of workstation central management systems, refers to tracking what workstation and related network devices exist is called ___.
INVENTORY MANAGEMENT
Refers to the organization’s local area network infrastructure is called ___.
LAN DOMAIN
Refers to the technical infrastructure that connects the organization’s local area network to a wide area network is called ___.
LAN-TO-WAN DOMAIN
In the context of workstation central management systems, refers to extracting logs from the workstation is called ___.
LOG MANAGEMENT
Refers to making sure that devices on the network, such as workstations and servers, have current patches from the vendor is called ___.
PATCH MANAGEMENT
Places importance on privacy in the business and discusses the regularity landscape and government mandates and often talks about physical security and the importance of “locking up” sensitive information is called ___.
PRIVACY POLICY
Refers to the technology that controls how end users connect to an organization’s local area network is called ___.
REMOTE ACCESS DOMAIN
Enhanced authentication over what’s typically found in the office. Usually requires more than an ID and Password, such as a security token or smart card is called ___.
REMOTE AUTHENTICATION
Connects local area networks to wide area networks is called ___.
ROUTER