R Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Reciprocal agreement

A

Emergency processing agreement between two or more enterprises with similar equipment or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recovery action

A

Execution of a response or task according to a written procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Recovery point objective (RPO)

A

Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recovery time objective (RTO)

A

The amount of time allowed for the recovery of a business function or resource after a disaster occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Red team

A

A group authorized and organized to emulate bad actors using similar tactics, techniques, and procedures to provide feedback from an offensive perspective. Red teams are typically employed by organizations with larger security teams and differ from penetration testing. While both have a similar goal of improving security, penetration testing mainly focuses on identifying technical vulnerabilities narrowly scoped by rules of engagement, whereas red teaming is more in-depth and often longer duration. Red teaming better assesses
detection and response capabilities largely by leveraging social engineering and exploitation of applications, network services and physical facilities. Red teams are also employed in other fields such as airport security, the military and intelligence agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redundant array of inexpensive disks (RAID)

A

Provides performance improvements and fault-tolerant capabilities via hardware or software solutions, by writing to a series of multiple disks to improve performance and/or save large files simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Redundant site

A

A recovery strategy involving the duplication of key IT components, including data or other key business processes, whereby fast recovery can take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Request for proposal (RFP)

A

A document distributed to software vendors requesting them to submit a proposal to develop or provide a software product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Residual risk

A

The remaining risk after management has implemented a risk response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Return on investment (ROI)

A

A measure of operating performance and efficiency, computed in its simplest form by dividing net income by the total investment over the period being considered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk acceptance

A

Decision to accept a risk, made according to the risk appetite and risk tolerance set by senior management where the enterprise can assume the risk and absorb any losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk analysis

A

The initial steps of risk management: analyzing the value of assets to the business, identifying threats to those assets and evaluating how vulnerable each asset is to those threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk analysis

A

A process by which frequency and magnitude of IT risk scenarios are estimated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk appetite

A

The amount of risk, on a broad level, that an entity is willing to accept in pursuit of its mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk assessment

A

A process used to identify and evaluate risk and its potential effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk avoidance

A

The process for systematically avoiding risk, constituting one approach to managing risk

17
Q

Risk mitigation

A

The management of risk through the use of countermeasures and controls

18
Q

Risk response

A

Risk avoidance, risk acceptance, risk sharing/transfer, risk mitigation, leading to a situation that as much future residual risk (current risk with the risk response defined and implemented) as possible (usually depending on budgets available) falls within risk appetite limits.

19
Q

Risk tolerance

A

The acceptable level of variation that
management is willing to allow for any particular risk as the enterprise pursues its objectives

20
Q

Risk transfer

A

The process of assigning risk to another enterprise, usually through the purchase of an insurance policy or by outsourcing the service

21
Q

Risk

A

The combination of the likelihood of an event and its impact

22
Q

Robustness

A

The degree to which a software system or component can function correctly in the presence of invalid inputs or stressful environmental conditions

23
Q

Root cause analysis

A

A process of diagnosis to establish the origins of events, which can be used for learning from consequences, typically from errors and problems

24
Q

Rootkit

A

A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system