policies to organizational security Flashcards

1
Q

The _____ for a software product occurs when a product will no longer be produced or sold. These products are most likely to be replaced by a newer version or model.

A

end of life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _____ describes when a vendor will no longer support a product. As well, updates and patches will no longer be produced.

A

end of service life (EOSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is an outdated computing software or hardware that is still in use. Legacy systems generally receive no support or maintenance.

A

legacy system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ analysis is the process of gathering and analyzing data from social media platforms.

A

Social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ identify the procedures and rules that an employee must abide by in an organization.

A

Rules of behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An _____ policy describes the purpose of a system and the responsibilities of users when accessing the system. An _____ policy contains a privacy statement informing users of what is considered private.

A

acceptable use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When an employee or contractor signs a _____, they are confirming they will not share confidential information with a third party. Signing such a contract legally protects internal intellectual property.

A

Non-Disclosure Agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ refers to creating an account for the user to access the computer system with the appropriate privileges.

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _____ is an onboarding process that involves identifying the roles and permissions users need.

A

workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is the process by which accounts are deleted or disabled. When personnel no longer need access to specific resources, permissions are withdrawn.

A

Offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ is an account management practice that involves giving users permission to a resource for the duration of a specific project or a need-to-know situation.

A

Privilege bracketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a Windows-specific function that prevents users from invoking administrative privileges without specific authorization.

A

User Account Control (UAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____ is a documented list of steps or actions used to perform a task to a specified and expected standard.

A

Standard Operating Procedure (SOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a mix of training techniques in the form of workshops, seminars, gamification, etc. to foster user engagement and retention.

A

Training diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ is a training technique to engage users by adding game-like elements to content to encourage participation.

A

Gamification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ is a preliminary or exploratory agreement to express an intent to work together. _____ usually tend to be relatively informal and do not act as binding contracts.

A

Memorandum of Understanding (MOU)

17
Q

A _____ is a formal agreement or contract that contains specific obligations rather than a broad understanding.

A

Memorandum of Agreement (MOA)

18
Q

Analyze and select the statements that accurately distinguish the differences between Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF). (Select all that apply.)

A

MTTF should be used for non-repairable assets, while a server (repairable by replacing the hard drive) would be described with an MTBF.

MTTF and MTBF can determine the amount of asset redundancy a system should have.

19
Q

A _____ is a contractual agreement setting out detailed terms (including support metrics) for future provided services.

A

Service Level Agreement (SLA)

20
Q

An _____ is used when any federal agency interconnecting its IT system to a third-party.

A

Interconnection Security Agreement (ISA)