redo 14 Flashcards

1
Q

to configure confidentiality rules and policies, log incidents, and compile reports.

A

policy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

to enforce policy on client computers, even when they are not connected to the network.

A

endpoint agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

to scan communications at network borders and interface with web and messaging servers to enforce policy.

A

network agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sets out procedures and guidelines for dealing with security incidents

A

incident response policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

making the system resilient to attack in the first place

A

preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders.

A

detection and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

limiting the scope and magnitude of the incident

A

containment , eradication, recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

analyzing the incident and responses to identify whether procedures or systems could be improved

A

post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is any event that breaches security policy

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Larger organizations will provide a dedicated ____________________ as a single point-of-contact for security incidents

A

Computer Security Incident Response Team (CSIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________________ means that the evidence cannot be seen with the naked eye; rather, it must be interpreted using a machine or process.

A

Latent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ products scan content in structured formats, such as a database with a formal access control model, or unstructured formats, such as email or word processing documents

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly