Network Policies Flashcards

1
Q

Baseline

A

Creates a reference point in network architecture and design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Change Management

A

▪ Structured way of changing the state of a computer system, network, or
IT procedure
▪ Make sure the risks are considered prior to implementing a system or
network change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Response Plan

A
Contains instructions to help network and system administrators detect,
respond to, and recover from network security incidents
● Preparation
● Identification
● Containment
● Eradication
● Recovery
● Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disaster Recovery Plan

A

Documents how an organization can quickly resume work after an
unplanned incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Continuity Plan

A

o Outlines how a business will continue operating during an
unplanned disruption in service
o A disaster recovery plan will be referenced from a business
continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System Life Cycle Plan

A

o Describes the approach to maintaining an asset from

creation to disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Standard Operating Procedure

A

▪ A set of step-by-step instructions compiled by an organization to help its
employees carry out routine operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password Policy

A

▪ A set of rules created to improve computer security by motivating users
to create and properly store secure passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acceptable Use Policy (AUP)

A

A set of rules that restricts the ways in which a network resource may be used and sets guidelines on how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bring Your Own Device (BYOD) Policy

A

▪ Allows employees to access enterprise networks and systems using their
personal mobile devices
▪ Create a segmented network where the BYOD devices can connect to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Access Policy

A

▪ A document which outlines and defines acceptable methods of remotely
connecting to the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Onboarding Policy

A

▪ A documented policy that describes all the requirements for integrating a
new hire into the company and its cultures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Offboarding Policy

A

▪ A documented policy that covers all the steps to successfully part ways
with an employee who’s leaving the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Policy

A

▪ A document that outlines how to protect the organization’s systems,
networks, and data from threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Loss Prevention Policy

A

▪ A document defining how organizations can share and protect data
▪ Data loss prevention policy minimizes accidental or malicious data loss
▪ Set proper thresholds for your DLP policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-Disclosure Agreement (NDA)

A

▪ Defines what data is confidential and cannot be shared outside of that
relationship
▪ A non-disclosure agreement is an administrative control
● Fines
● Forfeiture of rights
● Jail time

17
Q

Memorandum of Understanding (MOU)

A

▪ Non-binding agreement between two or more organizations to detail
what common actions they intend to take
▪ Often referred to as a letter of intent
▪ Usually used internally between two business units

18
Q

Service-Level Agreement (SLA)

A

▪ Documents the quality, availability, and responsibilities agreed upon by a
service provider and a client