RM1 Flashcards

0
Q

—- can be classified into different types: strategic, compliance, financial, operational, environmental, technical, and managerial.

A

Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A risk is the likelihood that the threat agent will exploit a ___].

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are different strategies for controlling risk. ____ is the process of assigning and revoking privileges to objects; that is, it covers the procedures of managing object authorizations.

A

Privilege management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One element of privilege management is periodic reviewing of a subject’s privileges over an object, and is known as ____

A

privilege auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____refers to a methodology for making changes and keeping track of those changes.

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Without ____ in procedures, a change may negate or diminish a previous change or even unknowingly create a security vulnerability.

A

proper documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change management seeks to approach changes systematically and provide the necessary ____] of the changes.

A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is the framework and functions required to enable incident response and incident handling within an organization.

A

Incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The objective of incident management is to ____ the normal operations as quickly as possible with the least possible impact on either the business or the users.

A

restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security policy is a ____

A

written document that states how an organization plans to protect the company’s information technology assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An effective security policy must carefully balance two key elements, _____.

A

trust and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security policy attempts to provide a balance between ____

A

no trust and too much trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The appropriate level of control is determined by the ____

A

security needs and the culture of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___] is a collection of requirements specific to the system or procedure that must be met by everyone

A

standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a collection of suggestions that should be implemented.

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ is a document that outlines specific requirements or rules that must be met, and is the correct means to be used for establishing security.

A

policy

16
Q

Most organizations follow a three-phase cycle in the development and maintenance of a security policy. The first phase is a _____; the second phase is to use the _____ to ____. The final phase is to ____

A

risk management study
risk management study/ develop the policy
review the policy for compliance.

17
Q

An ___ defines the actions users may perform while accessing systems and networking equipment.

A

acceptable use policy (AUP)

18
Q

Because privacy is of growing concern, many organizations have a ____that outlines how the organization uses information it collects.

A

privacy policy

19
Q

Policies of the organization that address security as it relates to human resources are known as ____.

A

security-related human resource policies

20
Q

A ____addresses how passwords are created and managed.

A

password management and complexity policy

21
Q

A ____ addresses how to dispose of confidential resources. This policy often covers how long records and data will be retained.

A

disposal and destruction policy

22
Q

A _____ produces a standardized framework for classifying information assets.

A

classification of information policy

23
Q

An —- is a written code of conduct intended to be a central guide and reference for employees in support of day-to-day decision making.

A

ethics policy

24
Q

To provide users with the knowledge and skills necessary to support information security, users need to receive ongoing ____

A

awareness and training.

25
Q

_____ involve instruction regarding compliance, secure user practices, and an awareness of threats. There are also techniques that should be considered to make the training informative and useful.

A

Awareness and training

26
Q

____ A policy that defines the actions users may perform while accessing systems and networking equipment.

A

acceptable use policy (AUP)

27
Q

A methodology for making modifications to a system and keeping track of those changes.

A

change management

28
Q

The “framework” and functions required to enable incident response and incident handling within an organization.

A

incident management

29
Q

A network that does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network.

A

peer-to-peer (P2P) network

30
Q

A policy that outlines how the organization uses personal information it collects.

A

privacy policy

31
Q

A written document that states how an organization plans to protect the company’s information technology assets.

A

security policy

32
Q

Grouping individuals and organizations into clusters or groups based on a like affiliation.

A

social networking

33
Q

Web sites that facilitate linking individuals with common interests like hobbies, religion, politics, or school or work contacts.

A

social networking sites