Section 18: Network Policies Flashcards

1
Q

*IT Governance

A

Used to provide a comprehensive security management framework for the organization
▪ Policies
▪ Standards
▪ Baselines
▪ Guidelines
▪ Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT Governance Policy Definition and Types (3)

A

Governance Policy - Defines the role of security inside of an organization and establishes the desired end state for that security program
▪ Organizational
▪ System-specific
▪ Issue-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy - Organizational

A

Provides framework to meet the business goals and define the roles, responsibilities, and terms associated with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy - System-specific

A

Addresses the security of a specific technology, application, network, or computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policy - Issue-specific

A

Addresses a specific security issue such as email privacy, employee termination procedures, or other specific issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standard

A

A policy in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Baseline

A

A reference point in network architecture and design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Guideline

A

Recommended action that allows for exceptions and allowances in unique situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Procedure

A

Detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*Change Management

A

▪ Structured way of changing the state of a computer system, network, or IT procedure
▪ Ensure the risks are considered prior to implementing a system or network change
● Planned
● Approved
● Documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

*Incident Response Plan

A

▪ Instructions to help network and system administrators detect, respond to, and recover from network security incidents
Should cover six steps/phases:
● Preparation
● Identification
● Containment
● Eradication
● Recovery
● Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

*Disaster Recovery Plan (DRP)

A

▪ Documents how an organization can quickly resume work after an unplanned incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Continuity Plan (BCP)

A

▪ Outlines how a business will continue operating during an unplanned disruption in service
▪ A disaster recovery plan will be referenced from a business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*System Life Cycle Plan (Five phases)

A

▪ Describes the approach to maintaining an asset from creation to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SLC Phase 1: Planning

A

Involves the planning and requirement analysis for a given system, including architecture outlining and risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SLC Phase 2: Design

A

Outlines new system, including possible interconnections, technologies to use, and how it should be implemented

17
Q

SLC Phase 3: Transition

A

Actual implementation, which could involve coding new software, installing the systems, and network cabling and configurations

18
Q

SLC Phase 4: Operations

A

Includes the daily running of the assets, as well as updating, patching, and fixing any issues that may occur

19
Q

SLC Phase 5: Retirement

A

End of the lifecycle and occurs when the system or network no longer has any useful life remaining

20
Q

*SOP

A

Standard Operating Procedure - A set of step-by-step instructions compiled by an organization to help its employees carry out routine operations

21
Q

*Password Policy

A

▪ A set of rules created to improve computer security by motivating users to create and properly store secure passwords

22
Q

*Acceptable Use Policy (AUP)

A

▪ A set of rules that restricts the ways in which a network resource may be used and sets guidelines on how it should be used

23
Q

*Bring Your Own Device (BYOD) Poli

A

▪ Allows employees to access enterprise networks and systems using their personal mobile devices
▪ Create a segmented network where the BYOD devices can connect to

24
Q

*Remote Access Policy

A

▪ A document which outlines and defines acceptable methods of remotely connecting to the internal network

25
Q

*Onboarding Policy

A

▪ A documented policy that describes all the requirements for integrating a new hire into the company and its cultures

26
Q

*Offboarding Policy

A

▪ A documented policy that covers all the steps to successfully part ways with an employee who’s leaving the company

27
Q

*Security Policy

A

▪ A document that outlines how to protect the organization’s systems, networks, and data from threats

28
Q

*Data Loss Prevention Policy

A

▪ A document defining how organizations can share and protect data
▪ Data loss prevention policy minimizes accidental or malicious data loss
▪ Set proper thresholds for your DLP policy

29
Q

Common Agreements

A

Non-Disclosure Agreement (NDA)
▪ Defines what data is confidential and cannot be shared outside of that relationship
▪ A non-disclosure agreement is an administrative control (not a technical control)

Memorandum of Understanding (MOU)
▪ Non-binding agreement between two or more organizations to detail what common actions they intend to take
▪ Often referred to as a letter of intent
▪ Usually used internally between two business units

Service-Level Agreement (SLA)
▪ Documents the quality, availability, and responsibilities agreed upon by a service provider and a client

30
Q

Interface Statistics

A

Read an interface statistic screen and know some of the details. Specifically, should know: Link State; Speed and Duplex Status; Send and Receive Traffic Statistics; CRC Statistics; Protocol Packet and Byte Counts; CRC Errors; Giants and Runts.

Things to look at for a slow-down: Duplex, Collisons, CRC errors, …