Security for Networked AV Applications Flashcards
Ideally, security requirements should be identified during the ____ phase.
needs analysis
A ____ describes what an organization is trying to protect and how vigorously it needs to protect it.
security posture
The security posture should be set by the ____.
A. AV designer
B. architect
C. client
D. general contractor
C. client
Stakeholder Input
These are the stakeholders who own data. They determine what needs to be protected and how vigorously. The other two areas support operational security.
A. Security
B. Network
C. Physical
A. Security
Stakeholder Input
These are the IT stakeholders who specify and administrate network policies. There are generally two types of stakeholders: those responsible for the ports and protocols, firewalls, and routers in a network; and those responsible for access control.
A. Security
B. Network
C. Physical
B. Network
Stakeholder Input
These are traditional security stakeholders, responsible for physical access to gear, spaces, and more. They can help you create policies on how to secure gear and cabinets to prevent theft.
A. Security
B. Network
C. Physical
C. Physical
The Triple-A of Access Control
The person using the system is who they say they are. This is proven with certificates, passwords, and tokens.
A. Authentication
B. Authorization
C. Accounting
A. Authentication
The Triple-A of Access Control
The person using the system is allowed to use it and take specific actions. This is managed through permissions in the system and directories.
A. Authentication
B. Authorization
C. Accounting
B. Authorization
The Triple-A of Access Control
Those who manage the network
also have an accurate record of what happens with the system and over the network in general.
A. Authentication
B. Authorization
C. Accounting
C. Accounting
Producing records proving who was using a networked system and what they did while they had access is called ____.
nonrepudiation
HTTP, Telnet, and FTP are ____ protocols, meaning anyone with access and a simple network analyzer can see exactly what’s going across the wire, including usernames and passwords.
clear-text
A ____ is a methodology for prioritizing the threats that you can mitigate. It usually takes the form of a comprehensive table or spreadsheet and helps you assign value to risks depending on two factors: probability and impact.
risk register
The CIA triad stands for ____, ____, ____.
Confidentiality, Integrity, Availability.
Typically, there are four ways to handle risk.
Limit or avert the risky activity.
A, Avoid
B. Accept
C. Transfer
D. Mitigate
A, Avoid
Typically, there are four ways to handle risk.
Because the probability or impact is low enough, the client is willing to take the risk.
A, Avoid
B. Accept
C. Transfer
D. Mitigate
B. Accept