security policies Flashcards

1
Q

_______ is performed to ensure that critical business functions will be available to those that must have access to those functions

A

business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a _________ identifies appropriate disaster responses in order to maintain business operations during reduced or restricted infrastructure and resource capabilities.

A

Business Continuity Plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when a small number of individuals get together and test just one part of the BCP this is called

A

a tabletop exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in a _________ , a larger number of individuals get together and work though a larger-scale simulation that incorporates many parts of the BCP

A

medium exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this involves a large number of individuals using realistic scenario that may involve full-scale practice exercises effort

A

complex exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ________ is similar to a BCP, but can also refer to the preparations and institutions maintained by the United States government

A

Continuity of Operations Planning (COOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a _______ focuses on how losses will effect an organization.

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the _______ identifies short-term actions to take to stop the incident and restore critical functions so the organization can continue to operate.

A

Disaster Recovery Plan (DRP) identifies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this defines the security requirements for a computer system when designing, assembling, delivering, installing, configuring, and initializing applications and data

A

common criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ manages the interaction between subjects and objects using an access control database.

A

reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the actual operating system implementation of the reference monitor concept is called

A

security kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

using the reference monitor method, the system gives the user a _____ which allows them to access resources associated with their account

A

tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ separates various processes and tasks into trusted rings.

A

Ring architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ separates the trusted from the untrusted.

A

security perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ restricts the ability of a program to read and write to memory according to its permissions or access level.

A

confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ protect a system from exploitation by controlling the amount of a subject’s access to system resources, such as memory.

A

bounds

17
Q

__________ separates the resources used by one process from the resources used by other processes.

A

isolation

18
Q

______ define the rules for communication between layers.

A

application programing interfaces (APIs)

19
Q

________ is a layering security technique that causes information within a single layer to be hidden from upper and lower layers of processing, thus securing individual layers.

A

hiding

20
Q

if refers to the product or system that is being evaluated.

A

Target of Evaluation

TOE

21
Q

a _________ is an application running on a real system that mimics hardware platforms in order to support the running of multiple operating systems on a single real machine.

A

virtual machine

22
Q

VMWare and Microsoft hyper -v is an example of

A

virtual machine software

23
Q

________ are the documents that explicitly identify the terms and conditions of employment

A

employment agreement

24
Q

a legal contract between the organization and the employee that specifies the employee is not to disclose the organization’s confidential information.

A

non disclosure agreement

25
Q

it prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization.

A

Non-compete agreement

26
Q

________ specifies the organization’s ownership of intellectual property created by the employee during the employment period.

A

ownership of materials agreement

27
Q

it documents the security classification levels of information and the guidelines for handling each level of classified materials.

A

Data handling and

classification policy

28
Q

the _______ is designed to prevent confidential information being left where it is easily accessible.

A

clean desk policy

29
Q

the _______ identifies the employee’s rights to use company property such as Internet access and computer equipment for personal use

A

acceptable use agreement

30
Q

the ______ outlines the organization’s monitoring activities

A

employee monitoring agreement