my class Flashcards
cram
A __________ consists of multiple servers using ______________.
web farm, network load balancing
Bob is the project manager for his company’s security countermeasure implementation project. Michael informs Bob that task #12 (implementing a failover cluster) will not finish on time. Because task #12 is on the project’s __________, Bob knows that the project will not complete on time and sets up a meeting to inform the stakeholders.
critical path
Which of the following is not commonly included in a cost-benefit analysis (CBA)?
A business continuity plan (BCP)
All of the following would be specified in a password policy, except:
password management.
Which tool is most commonly used to prioritize mitigation efforts?
Threat likelihood/impact matrix
What are overlapping countermeasures?
Different countermeasures that attempt to mitigate the same risk
What is the primary tool used to ensure countermeasures are implemented?
Plan of action and milestones (POAM)
Which approach to firewall rules starts off by blocking all traffic and then adding rules to allow approved traffic?
Implicit deny
After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for the company’s private network and convinces the friend to delete important files from the company’s database. You are confused when you review the audit logs and see that the disgruntled employee has been logging in from within the office every day for the past week. What has been lost in this scenario?
Nonrepudiation
Which of the following terms is best defined as a weakness?
Vulnerability
___________ prevents individuals from denying they took an action.
Nonrepudiation
What is the purpose of a risk mitigation plan?
To implement countermeasures
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters?
Contingency Planning (CP)
Which of the following is a physical control that is most likely to be used with a proximity card?
A locked door
Purchasing insurance is the primary way for an organization to __________ or ___________ risk.
share, transfer
Which of the following is not a true statement about AES?
AES is the primary asymmetric encryption protocol used today.
A hacker wants to launch an attack on an organization. The hacker uses a tool to capture data sent over the network in cleartext, hoping to gather information that will help make the attack successful. What tool is the hacker using?
A packet analyzer
What changes plaintext data to ciphered data?
Encryption
__________ provide the detailed steps needed to carry out ___________.
Procedures, policies
Which of the following is not one of the three primary objectives of controls?
Eliminate
What is the purpose of nonrepudiation techniques?
To prevent people from denying they took actions
Some controls are identified based on the function they perform. What are the broad classes of controls based on function?
Preventative, detective, corrective
Which of the following is most likely to describe how to perform test restores?
A backup plan
A business continuity plan (BCP) is an example of a(n):
security plan.
Lower recovery time objectives (RTOs) are __________ but __________.
achievable, costly
What is the primary hazard of attempting to recover without a business impact analysis (BIA)?
Wasted effort due to a lack of direction as to which resources are most critical
ABC Wholesale Pet Supply sells pet supplies to retailers. Every transaction results in a duplicate hardcopy paper shipping document and invoice. The person picking up the order signs the documents and takes one copy. Two other copies stay at the warehouse. How would using multiple hardcopies of each transaction affect ABC's recovery point objective (RPO)?
Duplicate hardcopies of transactions increase complexity and decrease tolerable data loss.
A business impact analysis (BIA) identifies an impact that can result from a:
disruption in a business.
What are critical resources?
Those that are required to support critical business functions (CBFs)
After developing a business impact analysis (BIA) for her organization, Maria was asked by her manager to update the BIA recommendations with a higher recovery time objective (RTO). What is the most likely reason management would argue for a higher RTO?
Lower RTOs are more expensive.
What is the primary purpose of identifying critical resources in the business impact analysis (BIA) process?
Identify all IT assets that support critical business functions (CBFs).
By identifying critical business functions (CBFs) first, you use a ________ approach.
top-down
Which term is sometimes referred to as the maximum tolerable period of disruption (MTPD)?
Maximum acceptable outage (MAO)
What are the first two steps in the business impact analysis (BIA) process?
Identify the environment and identify stakeholders
Which of the following is not a direct cost?
Costs to regain market share
Which of the following is not an indirect cost?
Cost to re-create or recover data
Which of the following can determine that a business function is critical?
Any stakeholder
Your team is developing a business impact analysis (BIA). You have identified the critical business functions (CBFs) and associated processes. What should you do next?
Map processes to IT systems.
A business continuity plan (BCP) program manager within a large organization:
usually manages multiple BCP projects.
Which business continuity plan (BCP) test type brings all participants together in a conference room or similar environment to walk through BCP scenarios?
Tabletop exercise
Which key planning principle guides the development of a business continuity plan (BCP)?
Length of time expected before returning to normal operations
What is the overall goal of business continuity plan (BCP) exercises?
To demonstrate how the BCP will work
Having supplies on hand for continued production:
may conflict with other organizational planning principles.
Who is the most common person to authorize business continuity plan (BCP) activation in the order of succession if the chief executive officer (CEO) is unavailable?
Chief information officer (CIO)
What is the primary difference between a functional exercise and a full-scale exercise?
A full-scale exercise is more realistic than a functional exercise.
What step of a business continuity plan (BCP) comes after providing training?
Testing and exercising plans