security policies Flashcards

1
Q

_______ is performed to ensure that critical business functions will be available to those that must have access to those functions

A

business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a _________ identifies appropriate disaster responses in order to maintain business operations during reduced or restricted infrastructure and resource capabilities.

A

Business Continuity Plan (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when a small number of individuals get together and test just one part of the BCP this is called

A

a tabletop exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in a _________ , a larger number of individuals get together and work though a larger-scale simulation that incorporates many parts of the BCP

A

medium exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this involves a large number of individuals using realistic scenario that may involve full-scale practice exercises effort

A

complex exercise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ________ is similar to a BCP, but can also refer to the preparations and institutions maintained by the United States government

A

Continuity of Operations Planning (COOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a _______ focuses on how losses will effect an organization.

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the _______ identifies short-term actions to take to stop the incident and restore critical functions so the organization can continue to operate.

A

Disaster Recovery Plan (DRP) identifies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this defines the security requirements for a computer system when designing, assembling, delivering, installing, configuring, and initializing applications and data

A

common criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ manages the interaction between subjects and objects using an access control database.

A

reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the actual operating system implementation of the reference monitor concept is called

A

security kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

using the reference monitor method, the system gives the user a _____ which allows them to access resources associated with their account

A

tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ separates various processes and tasks into trusted rings.

A

Ring architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ separates the trusted from the untrusted.

A

security perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ restricts the ability of a program to read and write to memory according to its permissions or access level.

A

confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ protect a system from exploitation by controlling the amount of a subject’s access to system resources, such as memory.

17
Q

__________ separates the resources used by one process from the resources used by other processes.

18
Q

______ define the rules for communication between layers.

A

application programing interfaces (APIs)

19
Q

________ is a layering security technique that causes information within a single layer to be hidden from upper and lower layers of processing, thus securing individual layers.

20
Q

if refers to the product or system that is being evaluated.

A

Target of Evaluation

TOE

21
Q

a _________ is an application running on a real system that mimics hardware platforms in order to support the running of multiple operating systems on a single real machine.

A

virtual machine

22
Q

VMWare and Microsoft hyper -v is an example of

A

virtual machine software

23
Q

________ are the documents that explicitly identify the terms and conditions of employment

A

employment agreement

24
Q

a legal contract between the organization and the employee that specifies the employee is not to disclose the organization’s confidential information.

A

non disclosure agreement

25
it prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization.
Non-compete agreement
26
________ specifies the organization's ownership of intellectual property created by the employee during the employment period.
ownership of materials agreement
27
it documents the security classification levels of information and the guidelines for handling each level of classified materials.
Data handling and | classification policy
28
the _______ is designed to prevent confidential information being left where it is easily accessible.
clean desk policy
29
the _______ identifies the employee's rights to use company property such as Internet access and computer equipment for personal use
acceptable use agreement
30
the ______ outlines the organization's monitoring activities
employee monitoring agreement