IS4680 Chapter 6 Flashcards

1
Q

Baseline controls

A

Countermeasures that apply broadly to the entire IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CAATT - Computer assisted audit tools and techniques

A

Automated computerized tools and techniques auditors used to aid them in their auditing functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CMDB - Configuration management database

A

A central repository of system configuration items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISSAF - Information Systems Security Assessment Framework

A

A method for evaluation networks, systems, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP - Internet Protocol address

A

A numerical representation that identifies a system node on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network scan

A

An automated method for discovering host systems on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST 800-15

A

A NIST published technical guide to conducting information security tests and assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSSTMM - Open Source Security Testing Methodology Manual

A

A method that takes a scientific approach to security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk appetite

A

The degree of risk that an organization is willing to accept to achieve its goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk tolerance

A

The range of acceptance of risks to keep an organization within their appetite for risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rotation of duties

A

The process of rotating employees into different functions or job roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SCM - Security configuration management

A

The process and techniques around managing security-related configuration items that directly relate to controls or settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP - Transmission Control Protocol/Internet Protocol

A

A suite of protocols consisting of four layers, which describes how nodes on networks, including the Internet, interact and communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability scan

A

An automated method for testing a system’s services and applications for known security holes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly