KMN Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Key goal indicator (KGI)

A

A measure that tells management, after the fact, whether an IT process has achieved its business requirements; usually expressed in terms of information criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key performance indicator (KPI)

A

A performance indicator or key performance indicator is a type of performance measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key risk indicator (KRI)

A

A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mail relay server

A

An electronic mail (e-mail) server that relays messages so that neither the sender nor the recipient is a local user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Short for malicious software. Designed to infiltrate, damage or obtain information from a computer system without the owner’s consent. Examples of malware include computer viruses, worms, Trojan horses, spyware and adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mandatory access control (MAC)

A

Logical access control filters used to validate access credentials that cannot be controlled or modified by normal users or data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man-in-the-middle attack (MITM)

A

An attack strategy in which the attacker intercepts the communication stream between two parts of the victim system and then replaces the traffic between the two components with the intruder’s own, eventually assuming control of the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Masqueraders

A

Attackers that penetrate systems by using the identity of legitimate users and their logon credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maximum tolerable outages (MTO)

A

Maximum time that an enterprise can support processing in alternate mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Media access control (MAC)

A

Lower sublayer of the OSI Model Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Message authentication code

A

An American National Standards Institute (ANSI) standard checksum that is computed using Data Encryption Standard (DES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Message digest

A

A cryptographic hash function takes an input of an arbitrary length and produces an output (also known as a message digest) that is a standard-sized binary string. The output is unique to the input in such a way that even
a minor change to the input results in a completely different output. Modern cryptographic hash functions are
also resistant to collisions (situations in which different inputs produce identical output); a collision, while possible, is statistically improbable. Cryptographic hash functions are developed so that input cannot be determined readily from the output. See Hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mirrored site

A

An alternate site that contains the same information as the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile site

A

The use of a mobile/temporary facility to serve as a business resumption location. The facility can usually be delivered to any site and can house information technology and staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Monitoring policy

A

Rules outlining or delineating the way in which information about the use of computers, networks, applications and information is captured and interpreted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Net present value (NPV)

A

Calculated by using an after-tax discount rate of an investment and a series of expected incremental cash outflows (the initial investment and operational costs) and cash inflows (cost savings or revenues) that occur at
regular periods during the life cycle of the investment.

17
Q

Network address translation (NAT)

A

A methodology of modifying network address information in IP datagram packet headers while they are in transit across a traffic routing device for the purpose of remapping one IP address space into another

18
Q

Nonintrusive monitoring

A

The use of transported probes or traces to assemble information, track traffic and identify vulnerabilities.

19
Q

Nonrepudiation

A

The assurance that a party cannot later deny originating data; provision of proof of the integrity and origin of the data and that can be verified by a third party