MAS Flashcards

1
Q

4 areas of risk management framework

A

risk identification, risk assessment, risk treatment & risk monitoring & reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 areas for outsourcing

A

due diligence, cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 areas for development of systems

A

project management, security requirement & testing, source code review, end user development (business user developing their own systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 areas for service management

A

change management, program migration, incident management, problem management, capacity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 areas for system availability

A

system availability, disaster recovery plan, disaster recovery testing, data backup management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure security management

A

data loss prevention, technology refresh management, network & security configuration management, vulnerability assessment & penetration testing, patch management, security monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 areas for access control

A

user access management, privileged access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 areas for IT Audit

A

audit planning, remediation tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 areas for Data Center Protection & Control

A

threat & vulnerability risk assessment, physical security, data center resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Areas under Requirement & Testing

A

system access control, authentication, transaction authorization, data integrity, system activity logging, audit trail, security event tracking, exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Areas to cover during System Security Testing & Source code review

A

Information leakage, resiliency against input manipulation, unsafe programming practices, deviation from design specifications, encryption function, exception handling, business logic, authorization, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Computing

A

a service & delivery model for enabling on-demand network resource access to a shared pool of configurable computing resources (servers, storage or services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly