InfoSec Q2 Part1 – Flashcards

question
Strategic planning is the process of moving the organization towards its ____.
answer
Vision
question
Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.
answer
De Jure
question
The ____ is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.
answer
EISP
question
____ often function as standards or procedures to be used when configuring or maintaining systems.
answer
SysSPs
question
A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
answer
Framework
question
The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating, implementing, or maintaining security in their organization."
answer
ISO/IEC 27002
question
What country adopted ISO/IEC 17799?
answer
Britain
question
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.
answer
Blueprint
question
Effective management includes planning and ____.
answer
Controlling Organizing Leading
question
The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.
answer
IETF
question
The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.
answer
Security
question
____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.
answer
Managerial
question
Redundancy can be implemented at a number of points throughout the security architecture, such as in ____.
answer
Access Controls Firewalls Proxy servers
question
____ controls address personnel security, physical security, and the protection of production inputs and outputs.
answer
Operational
question
Security ____ are the areas of trust within which users can freely communicate.
answer
Domains
question
A buffer against outside attacks is frequently referred to as a(n) ____.
answer
DMZ
question
____-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
answer
Network
question
The SETA program is the responsibility of the ____ and is a control measure designed to reduce the incidences of accidental security breaches by employees.
answer
CISO
question
A(n) ____ plan deals with the identification, classification, response, and recovery from an incident.
answer
IR
question
The first phase in the development of the contingency planning process is the ____.
answer
BIA
question
An alert ____ is a document containing contact information for the people to be notified in the event of an incident.
answer
roster
question
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
answer
assessment
question
RAID ____ drives can be hot swapped.
answer
5
question
A ____ site provides only rudimentary services and facilities.
answer
cold
question
The transfer of large batches of data to an off-site facility is called ____.
answer
electronic vaulting
question
A(n) ____________________ is a plan or course of action that conveys instructions from an organization's senior management to those who make decisions, take actions, and perform other duties
answer
policy
question
The ____________________ of an organization is a written statement about the organization's goals answering the question of where the organization will be in five years
answer
vision
question
____________________-specific security policies often function as standards or procedures to be used when configuring or maintaining systems
answer
systems
question
The policy champion and manager is called the policy ____________________.
answer
administrator
question
Some policies may need a(n) ____________________ indicating their expiration date
answer
sunset clause
question
The security ____________________ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization
answer
framework
question
____________________ controls are security processes that are designed by strategic planners and implemented by the security administration of the organization.
answer
managerial
question
Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as ____________________.
answer
redundancy
question
A security ____________________ defines the boundary between the outer limit of an organization's security and the beginning of the outside world
answer
perimeter
question
A(n) ____________________ is a device that selectively discriminates against information flowing into or out of the organization
answer
firewall
question
A(n) ____________________ server performs actions on behalf of another system
answer
proxy
question
A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability
answer
incident
question
A(n) _________________________ plan ensures that critical business functions continue if a catastrophic incident or disaster occurs
answer
business continuity
question
An attack ____________________ is a detailed description of the activities that occur during an attack.
answer
profile
question
Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets
answer
response
question
Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident
answer
classification
question
A(n) ____________________ message is a scripted description of an incident, usually just enough information so that each individual knows what portion of the IR plan to implement, and not enough to slow down the notification process
answer
alert
question
Computer ____________________ is the process of collecting, analyzing, and preserving computer-related evidence
answer
forensics
question
A(n) ____________________ is a detailed examination of the events that occurred from first detection to final recovery
answer
after-action review
question
A(n) ____________________ backup is the storage of all files that have changed or been added since the last full backup
answer
differential
question
RAID Level 1 is commonly called disk __________________.
answer
mirroring
question
A(n) ____________________ site is a fully configured computer facility, with all services, communications links, and physical plant operations including heating and air conditioning.
answer
hot
question
A(n) ____________________ is a contract between two or more organizations that specifies how each will assist the other in the event of a disaster.
answer
mutual agreement
question
The actions taken during and after a disaster are referred to as ____________________ management
answer
crisis
question
The transfer of live transactions to an off-site facility is called ____________________.
answer
remote journaling
1 of

Unlock all answers in this set

Unlock answers
question
Strategic planning is the process of moving the organization towards its ____.
answer
Vision
question
Standards may be published, scrutinized, and ratified by a group, as in formal or ____ standards.
answer
De Jure
question
The ____ is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.
answer
EISP
question
____ often function as standards or procedures to be used when configuring or maintaining systems.
answer
SysSPs
question
A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
answer
Framework
question
The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating, implementing, or maintaining security in their organization."
answer
ISO/IEC 27002
question
What country adopted ISO/IEC 17799?
answer
Britain
question
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.
answer
Blueprint
question
Effective management includes planning and ____.
answer
Controlling Organizing Leading
question
The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.
answer
IETF
question
The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.
answer
Security
question
____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.
answer
Managerial
question
Redundancy can be implemented at a number of points throughout the security architecture, such as in ____.
answer
Access Controls Firewalls Proxy servers
question
____ controls address personnel security, physical security, and the protection of production inputs and outputs.
answer
Operational
question
Security ____ are the areas of trust within which users can freely communicate.
answer
Domains
question
A buffer against outside attacks is frequently referred to as a(n) ____.
answer
DMZ
question
____-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
answer
Network
question
The SETA program is the responsibility of the ____ and is a control measure designed to reduce the incidences of accidental security breaches by employees.
answer
CISO
question
A(n) ____ plan deals with the identification, classification, response, and recovery from an incident.
answer
IR
question
The first phase in the development of the contingency planning process is the ____.
answer
BIA
question
An alert ____ is a document containing contact information for the people to be notified in the event of an incident.
answer
roster
question
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.
answer
assessment
question
RAID ____ drives can be hot swapped.
answer
5
question
A ____ site provides only rudimentary services and facilities.
answer
cold
question
The transfer of large batches of data to an off-site facility is called ____.
answer
electronic vaulting
question
A(n) ____________________ is a plan or course of action that conveys instructions from an organization's senior management to those who make decisions, take actions, and perform other duties
answer
policy
question
The ____________________ of an organization is a written statement about the organization's goals answering the question of where the organization will be in five years
answer
vision
question
____________________-specific security policies often function as standards or procedures to be used when configuring or maintaining systems
answer
systems
question
The policy champion and manager is called the policy ____________________.
answer
administrator
question
Some policies may need a(n) ____________________ indicating their expiration date
answer
sunset clause
question
The security ____________________ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization
answer
framework
question
____________________ controls are security processes that are designed by strategic planners and implemented by the security administration of the organization.
answer
managerial
question
Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as ____________________.
answer
redundancy
question
A security ____________________ defines the boundary between the outer limit of an organization's security and the beginning of the outside world
answer
perimeter
question
A(n) ____________________ is a device that selectively discriminates against information flowing into or out of the organization
answer
firewall
question
A(n) ____________________ server performs actions on behalf of another system
answer
proxy
question
A(n) ____________________ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability
answer
incident
question
A(n) _________________________ plan ensures that critical business functions continue if a catastrophic incident or disaster occurs
answer
business continuity
question
An attack ____________________ is a detailed description of the activities that occur during an attack.
answer
profile
question
Incident ____________________ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets
answer
response
question
Incident ____________________ is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident
answer
classification
question
A(n) ____________________ message is a scripted description of an incident, usually just enough information so that each individual knows what portion of the IR plan to implement, and not enough to slow down the notification process
answer
alert
question
Computer ____________________ is the process of collecting, analyzing, and preserving computer-related evidence
answer
forensics
question
A(n) ____________________ is a detailed examination of the events that occurred from first detection to final recovery
answer
after-action review
question
A(n) ____________________ backup is the storage of all files that have changed or been added since the last full backup
answer
differential
question
RAID Level 1 is commonly called disk __________________.
answer
mirroring
question
A(n) ____________________ site is a fully configured computer facility, with all services, communications links, and physical plant operations including heating and air conditioning.
answer
hot
question
A(n) ____________________ is a contract between two or more organizations that specifies how each will assist the other in the event of a disaster.
answer
mutual agreement
question
The actions taken during and after a disaster are referred to as ____________________ management
answer
crisis
question
The transfer of live transactions to an off-site facility is called ____________________.
answer
remote journaling
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New