Deck 12: Information Security Maintenance

ملء الشاشة (f)
exit full mode
سؤال
A management model such as ISO 27000 deals with methods to maintain systems.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A general guideline for performance of hard drives suggests that when the amount of data stored on a particular hard drive averages 95% of available capacity for a prolonged period, you should consider an upgrade for the drive.
سؤال
Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, using software such as Wireshark.
سؤال
Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.
سؤال
The vulnerability database, like the risk, threat, and attack database, both stores and tracks information.
سؤال
The target selection step of Internet vulnerability assessment involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed.
سؤال
An intranet vulnerability scan starts with the scan of the organization's default Internet search engine.
سؤال
Over time, policies and procedures may become inadequate due to changes in the organization's mission and operational requirements, threats, or the environment.
سؤال
External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.
سؤال
The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.
سؤال
Digital forensics helps an organization understand what happened, and how, after an incident.
سؤال
All systems that are mission critical should be enrolled in platform security validation (PSV) measurement.
سؤال
Documenting information system changes and assessing their potential impact on system security is an important and consequential part of digital forensics.
سؤال
Over time, external monitoring processes should capture information about the external environment in a format that can be referenced across the organization as threats emerge and for historical use.
سؤال
Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability.
سؤال
If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well.
سؤال
Documentation procedures are not required for configuration and change management processes.
سؤال
An effective information security governance program requires no ongoing review once it is well established.
سؤال
US-CERT is generally viewed as the definitive authority for computer emergency response teams.
سؤال
Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.
سؤال
CM assists in streamlining change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen. _________________________
سؤال
For configuration management (CM) and control, it is important to document the proposed or actual changes in the system security plan. _________________________
سؤال
Rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security personnel the opportunity to improve the security plan before it is needed.
سؤال
An affidavit is sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place.
سؤال
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep approach-initiation, analysis, design, implementation, and use. _________________________
سؤال
Threats cannot be removed without requiring a repair of the vulnerability.
سؤال
The basic function of the external monitoring process is to monitor activity, report results, and escalate warnings. _________________________
سؤال
A maintenance ​ticket is opened when a user calls about an issue. _________________________
سؤال
CERT stands for "computer emergency recovery team." _________________________
سؤال
In some instances, risk is acknowledged as being part of an organization's business process.
سؤال
The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. _________________________
سؤال
Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
سؤال
Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________
سؤال
Policy needs to be reviewed and refreshed from time to time to ensure that it's providing a current foundation for the information security program.
سؤال
When setting a policy about whether to pursue attacks against its systems, organizations must choose from three approaches.
سؤال
In some organizations, facilities management is the identification, inventory, and documentation of the current information system's status-hardware, software, and networking configurations. _________________________
سؤال
US-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer security vulnerabilities. It is sponsored in part by SecurityFocus. _________________________
سؤال
Digital forensics involves chemical and microscopic analysis of evidence using computerized laboratory instruments.
سؤال
Tracking compliance involves assessing the status of the program as indicated by the database information and mapping it to goals established by the agency. _________________________
سؤال
An effective information security governance program requires constant change. _________________________
سؤال
A __________ is the recorded condition of a particular revision of a software or hardware configuration item.

A) state
B) version 
C) configuration
D) baseline
سؤال
A chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of evidence from the crime scene through its presentation in court. ___________
سؤال
The internal vulnerability assessment is usually performed against every device that is exposed to the Internet, using every possible penetration testing approach. _________________________
سؤال
__________ are a component of the security triple.

A) Threats
B) Assets 
C) Vulnerabilities
D) All of the above
سؤال
The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________
سؤال
The simplest part of an investigation is analyzing a copy or image for potential evidentiary material. __________
سؤال
To be put to the most effective use, the information that comes from the IDPS must be integrated into the inventory process. _________________________
سؤال
In digital forensic investigations for information security, most operations focus on policies-documents that provide managerial guidance for ongoing implementation and operations. ____________
سؤال
WLAN stands for "wide local area network." _________________________
سؤال
The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all the organization's networks, information systems, and information security defenses. _________________________
سؤال
A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________
سؤال
An affidavit is used as permission to search for evidentiary material at a specified location and/or to seize items to return to an investigator's lab for examination after being signed by an approving authority. _____________
سؤال
The process of identifying and documenting specific and provable flaws in the organization's information asset environment is called vulnerability assessment (VA). _________________________
سؤال
The best method of remediation in most cases is to repair a vulnerability. _________________________
سؤال
The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________
سؤال
When possible, major incident response plan elements should be rehearsed. _________________________
سؤال
Organizations should have a carefully planned and fully populated inventory of all their network devices, communication channels, and computing devices. _________________________
سؤال
An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked. _________________________
سؤال
You can document the results of the verification of a vulnerability by saving the results in what is called a(n) profile. _________________________
سؤال
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.

A) revision
B) update 
C) change
D) configuration
سؤال
The __________ is a statement of the boundaries of the RA.

A) scope
B) disclaimer 
C) footer
D) head
سؤال
The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to be present on the organization's internal network.

A) intranet
B) Internet 
C) LAN
D) WAN
سؤال
A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.

A) Bug
B) Bugfix 
C) Buglist
D) Bugtraq
سؤال
The __________ Web site and list site seclists.org is home to the leading free network exploration tool, Nmap.

A) insecure.org
B) Packet Storm 
C) Security Focus
D) Snort-sigs
سؤال
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A) Penetration testing
B) Penetration simulation 
C) Attack simulation
D) Attack testing
سؤال
__________ is used to respond to network change requests and network architectural design proposals.

A) Network connectivity RA
B) Dialed modem RA 
C) Application RA
D) Vulnerability RA
سؤال
The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

A) ASP
B) ISP 
C) SVP
D) PSV
سؤال
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

A) scanning
B) subrogation 
C) delegation
D) targeting
سؤال
The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

A) US-CERT
B) Bugtraq 
C) CM-CERT
D) CERT/CC
سؤال
__________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.

A) White box
B) Black box 
C) Gray box
D) Green box
سؤال
To maintain optimal performance, one typical recommendation suggests that when the memory usage associated with a particular CPU-based system averages __________% or more over prolonged periods, you should consider adding more memory.

A) 40
B) 60 
C) 10
D) 100
سؤال
One approach that can improve the situational awareness of the information security function is to use a process known as __________ to quickly identify changes to the internal environment.

A) baselining
B) difference analysis 
C) differentials
D) revision
سؤال
Control __________ baselines are established for network traffic and for firewall performance and IDPS performance.

A) system
B) application 
C) performance
D) environment
سؤال
Detailed __________ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.

A) escalation
B) intelligence 
C) monitoring
D) elimination
سؤال
The __________ commercial site focuses on current security tool resources.

A) Nmap-hackerz
B) Packet Storm 
C) Security Laser
D) Snort-SIGs
سؤال
To evaluate the performance of a security system, administrators must establish system performance __________.

A) baselines
B) profiles 
C) maxima
D) means
سؤال
A process called __________ examines the traffic that flows through a system and its associated devices to identify the most frequently used devices.

A) difference analysis
B) traffic analysis 
C) schema analysis
D) data flow assessment
سؤال
The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________.

A) IDE
B) CERT 
C) ERP
D) IRP
سؤال
Common vulnerability assessment processes include: 

A) Internet VA
B) wireless VA 
C) intranet VA
D) All of these
سؤال
The __________ mailing list includes announcements and discussion of a leading open-source IDPS.

A) Nmap-hackers
B) Packet Storm 
C) Security Focus
D) Snort
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/116
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Security Maintenance
1
A management model such as ISO 27000 deals with methods to maintain systems.
False
2
A general guideline for performance of hard drives suggests that when the amount of data stored on a particular hard drive averages 95% of available capacity for a prolonged period, you should consider an upgrade for the drive.
False
3
Wireless vulnerability assessment begins with the planning, scheduling, and notification of all Internet connections, using software such as Wireshark.
False
4
Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
5
The vulnerability database, like the risk, threat, and attack database, both stores and tracks information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
6
The target selection step of Internet vulnerability assessment involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
7
An intranet vulnerability scan starts with the scan of the organization's default Internet search engine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
8
Over time, policies and procedures may become inadequate due to changes in the organization's mission and operational requirements, threats, or the environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
9
External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
10
The internal monitoring domain is the component of the maintenance model that focuses on identifying, assessing, and managing the physical security of assets in an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
11
Digital forensics helps an organization understand what happened, and how, after an incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
12
All systems that are mission critical should be enrolled in platform security validation (PSV) measurement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
13
Documenting information system changes and assessing their potential impact on system security is an important and consequential part of digital forensics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
14
Over time, external monitoring processes should capture information about the external environment in a format that can be referenced across the organization as threats emerge and for historical use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
15
Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
16
If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
17
Documentation procedures are not required for configuration and change management processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
18
An effective information security governance program requires no ongoing review once it is well established.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
19
US-CERT is generally viewed as the definitive authority for computer emergency response teams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
20
Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
21
CM assists in streamlining change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
22
For configuration management (CM) and control, it is important to document the proposed or actual changes in the system security plan. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
23
Rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security personnel the opportunity to improve the security plan before it is needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
24
An affidavit is sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
25
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep approach-initiation, analysis, design, implementation, and use. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
26
Threats cannot be removed without requiring a repair of the vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
27
The basic function of the external monitoring process is to monitor activity, report results, and escalate warnings. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
28
A maintenance ​ticket is opened when a user calls about an issue. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
29
CERT stands for "computer emergency recovery team." _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
30
In some instances, risk is acknowledged as being part of an organization's business process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
31
The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
32
Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
33
Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
34
Policy needs to be reviewed and refreshed from time to time to ensure that it's providing a current foundation for the information security program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
35
When setting a policy about whether to pursue attacks against its systems, organizations must choose from three approaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
36
In some organizations, facilities management is the identification, inventory, and documentation of the current information system's status-hardware, software, and networking configurations. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
37
US-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer security vulnerabilities. It is sponsored in part by SecurityFocus. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
38
Digital forensics involves chemical and microscopic analysis of evidence using computerized laboratory instruments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
39
Tracking compliance involves assessing the status of the program as indicated by the database information and mapping it to goals established by the agency. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
40
An effective information security governance program requires constant change. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
41
A __________ is the recorded condition of a particular revision of a software or hardware configuration item.

A) state
B) version 
C) configuration
D) baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
42
A chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of evidence from the crime scene through its presentation in court. ___________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
43
The internal vulnerability assessment is usually performed against every device that is exposed to the Internet, using every possible penetration testing approach. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
44
__________ are a component of the security triple.

A) Threats
B) Assets 
C) Vulnerabilities
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
45
The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
46
The simplest part of an investigation is analyzing a copy or image for potential evidentiary material. __________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
47
To be put to the most effective use, the information that comes from the IDPS must be integrated into the inventory process. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
48
In digital forensic investigations for information security, most operations focus on policies-documents that provide managerial guidance for ongoing implementation and operations. ____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
49
WLAN stands for "wide local area network." _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
50
The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all the organization's networks, information systems, and information security defenses. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
51
A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
52
An affidavit is used as permission to search for evidentiary material at a specified location and/or to seize items to return to an investigator's lab for examination after being signed by an approving authority. _____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
53
The process of identifying and documenting specific and provable flaws in the organization's information asset environment is called vulnerability assessment (VA). _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
54
The best method of remediation in most cases is to repair a vulnerability. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
55
The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
56
When possible, major incident response plan elements should be rehearsed. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
57
Organizations should have a carefully planned and fully populated inventory of all their network devices, communication channels, and computing devices. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
58
An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
59
You can document the results of the verification of a vulnerability by saving the results in what is called a(n) profile. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
60
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.

A) revision
B) update 
C) change
D) configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
61
The __________ is a statement of the boundaries of the RA.

A) scope
B) disclaimer 
C) footer
D) head
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
62
The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to be present on the organization's internal network.

A) intranet
B) Internet 
C) LAN
D) WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
63
A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.

A) Bug
B) Bugfix 
C) Buglist
D) Bugtraq
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
64
The __________ Web site and list site seclists.org is home to the leading free network exploration tool, Nmap.

A) insecure.org
B) Packet Storm 
C) Security Focus
D) Snort-sigs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
65
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A) Penetration testing
B) Penetration simulation 
C) Attack simulation
D) Attack testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
66
__________ is used to respond to network change requests and network architectural design proposals.

A) Network connectivity RA
B) Dialed modem RA 
C) Application RA
D) Vulnerability RA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
67
The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

A) ASP
B) ISP 
C) SVP
D) PSV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
68
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

A) scanning
B) subrogation 
C) delegation
D) targeting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
69
The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

A) US-CERT
B) Bugtraq 
C) CM-CERT
D) CERT/CC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
70
__________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.

A) White box
B) Black box 
C) Gray box
D) Green box
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
71
To maintain optimal performance, one typical recommendation suggests that when the memory usage associated with a particular CPU-based system averages __________% or more over prolonged periods, you should consider adding more memory.

A) 40
B) 60 
C) 10
D) 100
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
72
One approach that can improve the situational awareness of the information security function is to use a process known as __________ to quickly identify changes to the internal environment.

A) baselining
B) difference analysis 
C) differentials
D) revision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
73
Control __________ baselines are established for network traffic and for firewall performance and IDPS performance.

A) system
B) application 
C) performance
D) environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
74
Detailed __________ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.

A) escalation
B) intelligence 
C) monitoring
D) elimination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
75
The __________ commercial site focuses on current security tool resources.

A) Nmap-hackerz
B) Packet Storm 
C) Security Laser
D) Snort-SIGs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
76
To evaluate the performance of a security system, administrators must establish system performance __________.

A) baselines
B) profiles 
C) maxima
D) means
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
77
A process called __________ examines the traffic that flows through a system and its associated devices to identify the most frequently used devices.

A) difference analysis
B) traffic analysis 
C) schema analysis
D) data flow assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
78
The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________.

A) IDE
B) CERT 
C) ERP
D) IRP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
79
Common vulnerability assessment processes include: 

A) Internet VA
B) wireless VA 
C) intranet VA
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
80
The __________ mailing list includes announcements and discussion of a leading open-source IDPS.

A) Nmap-hackers
B) Packet Storm 
C) Security Focus
D) Snort
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 116 في هذه المجموعة.