Network Policies Flashcards

1
Q

Defines the role of security inside of an organization and establishes the desired end state for that security program

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implements a policy in an organization

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Creates a reference point in network architecture and design

A

Baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recommended actions that are flexible and allow exceptions and allowances in unique situations

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Contains instructions to help network and system administrators detect, respond to, and recover from network security incidents

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the Incident Response Plan in Order

A

Preparation, Identification, Containment, Eradication, Recovery, and Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

documents how an organization can quickly resume work after an unplanned incident

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Outlines how a business will continue operating during an unplanned disruption in service

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the System Life Cycle Plan in order

A

Planning, Designs, Transitions, Operations, Retirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A set of rules that restricts the ways in which a network resource may be used and sets guidelines on how it should be used

A

Acceptable Use Policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows employees to access enterprise networks and systems using their personal mobile devices

A

Bring Your Own Device (BYOD) Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A document which outlines and defines acceptable methods of remotely connecting to the internal network

A

Remote Access Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A documented policy that describes all the requirements for integrating a new hire into the company and its cultures

A

Onboarding Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A documented policy that covers all the steps to successfully part ways with an employee who’s leaving the company

A

Offboarding Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A document defining how organizations can share and protect data

A

Data Loss Prevention Policy (DLP)

17
Q

is a contract between a service provider (either internal or external) and the end-user that defines the level of service expected from the service provide

A

Service Level Agreement (SLA)