Managing Risk Flashcards

1
Q

process for how a company deals with bad things on the network(s)

A

risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

any written documente descibing how a company protects its IT infrastructure

A

security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

document that explains what is and is not acceptable to do on an organization’s computers; typically describes ownership, network access, privacy/consent to monitoring, and illegal use

A

acceptable use policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

document that explains who can access a company’s network, how they may access it, and what they may access on it

A

network access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

company document that describes how a company addresses the risk of data loss or theft

A

data loss prevention (DLP) policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

provision of some security policies that restrict what hardware and software can be exported

A

international export controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rules on commercial software that determine whether (and where?) that software can be taken to other countries

A

licensing restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

permission granted to data stored on a laptop or device to be taken to another country

A

export license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

group of people in an organization in charge of investigation, testing, and implementing/authorizing all but the smallest change in the organization

A

change management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

process for approving a change request based on the details from a change request, management approval, and funding

A

approval process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in the process of making an IT infrastructure change, this is the period of time for implementing and testing a desired change

A

maintenance window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

permission by the change management team for systems, departments, etc. to be down when implementing a change

A

authorize downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

final step of an IT change, it includes documenting all changes, such as network configurations, additions to the network, and physical location changes

A

change management documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

one system that, if it failes, will cause significant stoppage - bring down an entire process, workflow, or the entire organization

A

single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

something that is critical to the operation of a company, not necessarily IT

A

critical assett

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

devices that are critical to a business’s operation, unique to IT

A

critical node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the making of critical nodes to be constantly working without interruption or downtime

A

high availability (HA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a single IP address that is shared by multiple systems, allowing for failover

A

virtual IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

open standard protocol that gangs multiple routers together into a single virtual router that uses one virtual IP address as the default gateway

A

Virtual Router Redundancy Protocol (VRRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cisco proprietary protocol that gangs multiple routers together to acts as one virtual router with one virtual IP address

A

Hot Standby Router Protocol (HSRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the combining of multiple machines to work together and share operational work; not provided by VRRP and HSRP

A

load balancing

22
Q

having multiple pieces of equipment working together, connected, and presenting as one logical device

A

clustering

23
Q

document between a customer and a service provider defining the scope, quality, and terms of services to be provided; common for ISPs

A

service-level agreement (SLA)

24
Q

document that describes an agreement between two companies where a legal agreement would not be appropriate in certain situations; would define costs, contacts, logistics, etc., such as hospitals taking over another’s patients in event of a tornado

A

memorandum of understanding (MOU)

25
Q

document between two parties that describes the interoperability between their components, such as a GBIC manufacturer’s devices working with Cisco and Juniper switches

A

multi-source agreement (MSA)

26
Q

a legal contract between a vendor and client, detailing the services and products the vendor will supply and time frame to supply them; Ex. IT company and client; explains what vendor needs to do, with milestones of the completion of the work

A

statement of work (SOW)

27
Q

legal document that many employees and even potential employees might sign, where they agree not to disclose any company secrets to outside sources

A

nondisclosure agreement (NDA)

28
Q

a program that will inspect your network for a large number of potential vulnerabilities, then create a report for you to act upon

A

vulnerability scanner

29
Q

Microsoft vulnerability analyzer that tests one Windows machine for vulnerablities

A

Microsoft Baseline Security Analyzer (MBSA)

30
Q

a popular, Free, and well-maintained software tool that tests a network for vulnerabiliteies and has other tools

A

Nmap

31
Q

by Tenable Network Security, this is a more aggressive and powerful comprehensive test (vulnerability test); requires subscription

A

Nessus

32
Q

the use of a “white hat” friendly hacker to find vulnerabilities in a network and exploit them, then create a report for the purpose of hardening the network

A

penetration testing

33
Q

document about how to limit damage and recover quickly from an incident

A

contingency plan

34
Q

response to an incident that involves stopping, containing, and remediating the incident without outside resources; such team might have responsible for determining whether an incident qualifies, the level of severity, scope and cause, prevent further disruption, resolve the cause, restore affected systems, and ID ways to prevent a reoccurence

A

incident response

35
Q

response to an incident that cannot be contained and cuases significant damage or danger to the immediate infrastructure; team gets IT infrastructure up and running as soon as possible at primary locations and restores from backups they created

A

disaster recovery

36
Q

backs up every file, with the archive bit turned off for every file; standard

A

full backup

37
Q

backs up only files with the archive bit turned on, then turns off the bit for those files; takes up less storage, but takes longer to restore

A

incremental backup

38
Q

backs up all files changed since the last full backup - backs up files with the archive bit turned on and does not turn off the archive bit; uses up more space, but is faster as restoring

A

differential backup

39
Q

the state of the backup when data is recovered - how much data is lost

A

recovery point objective (RPO)

40
Q

the amount of time to restore full functionality from when an organization ceases of function

A

recovery time objective (RTO)

41
Q

factor describing an estimated time between one failure and the next failure of a hardware component by the manufacturer

A

mean time between failures (MTBF)

42
Q

factor describing an estimated time until a hardware component fails and will need to be replaced

A

mean time to failure (MTTF)

43
Q

factor describing the estimated amount of time it takes for a hardware component to recover from a failure

A

mean time to recovery (MTTR)

44
Q

response to an incident that enable an organization to function at a remote location when the primary inftrastructure is inoperational; must include backup sites

A

business continuity

45
Q

document or plan to fill a position in the event someone in a critical position is incapacitated or lost in an incident

A

succession planning

46
Q

document where one, such as the first responder, reports their findings from a computer crime, if any

A

forensics report

47
Q

process of an organization preserving and organizing data in anticipation of or in response to a legal issue

A

legal hold

48
Q

process of providing or requesting data (forensics reports and/or data from a device) in a legal way

A

electronic discovery (e-discovery)

49
Q

the existence of a voltage differential between two parts of a network

A

ground loop

50
Q

system that can detect fire, cut power to equipment, displace oxygen, activate sprinklers, and alert staff; needed for a server room (also need to get out any electrical spark, with this?)

A

fire suppression system