Deck 13: Security Policy Design and Implementation

ملء الشاشة (f)
exit full mode
سؤال
Which of the following shows how devices are connected and includes an IP allocation register?

A) hardware inventory
B) topology map
C) asset table
D) security policy
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT a step in threat and risk assessment?

A) Asset definition
B) Recommendation
C) Resolution
D) Threat assessment
سؤال
Which of the following would be considered a vulnerability?

A) installation of a firewall
B) antivirus software
C) Internet-connected computer
D) spyware
سؤال
Which best defines residual risk?

A) risk that occurs as a result of new vulnerabilities
B) the amount of risk remaining after countermeasures are implemented
C) a vulnerability for which the risk has been reduced to zero
D) the cost of implementing solutions to an assessed risk
سؤال
Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?

A) resistance
B) recovery
C) recognition
D) reliability
سؤال
Which is best defined as the ability of a system to continue operations despite a failure?

A) fault tolerance
B) survivability analysis
C) reliability audit
D) adaptation and evolution
سؤال
The process of reviewing records of network computer activity is called which of the following?

A) monitoring
B) archiving
C) auditing
D) recording
سؤال
An extranet is a backup network that you can use if the main network fails.
سؤال
The first step in SNA is the survivability analysis.
سؤال
Once written,a security policy should not be altered so that you can maintain consistency.
سؤال
What is considered the first step in formulating a security policy?

A) risk analysis
B) elimination of threats
C) risk reduction
D) system monitoring
سؤال
The first phase of the system development life cycle is needs assessment.
سؤال
The people that manage security for the organization should not be same people that conduct risk analysis.
سؤال
Which of the following is NOT a phase in the system development life cycle?

A) needs assessment
B) security audit
C) system implementation
D) performance monitoring
سؤال
Which of the following is NOT among the six factors needed to create a risk analysis?

A) threats
B) consequences
C) personnel profiles
D) probabilities
سؤال
Which of the following requires you to assist police by appearing in court or producing evidence?

A) subpoena
B) search warrant
C) the 4th amendment
D) de facto agent
سؤال
Which of the following best describes a Monte Carlo simulation?

A) a technique for simulating an attack on a system
B) a formula that estimates the cost of countermeasures
C) a procedural system that simulates a catastrophe
D) an analytical method that simulates a real-life system for risk analysis
سؤال
Which of the following is considered an asset?

A) hacker
B) unpatched Web server
C) disgruntled employee
D) intellectual property
سؤال
Which of the following best describes ROI?

A) the chance that a threat will result in lost money
B) how long before an investment will pay for itself
C) the cost of mitigating a threat
D) the benefits of setting security priorities
سؤال
Which of the following defines how employees should use the organization's computing resources?

A) Network and Internet Policy
B) Email and Spam Policy
C) Computing and Resource Policy
D) Acceptable Use Policy
سؤال
Your exposure to risk increases if your organization has one or more factors that increase _____________ probabilities.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a private network that a company sets up as an extension of its corporate intranet
سؤال
The __________________ phase of the system development life cycle can lead you to the needs assessment phase where the cycle begins again.
سؤال
VPNs create a _____________ to transport information through public communications media.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
routers,cables,bastion hosts,servers,and firewall components that enable employees to communicate with one another
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a document that details additional access options and responsibilities of users with privileged access to resources
سؤال
________________ clauses exist in acceptable use policies so that companies can discipline employees whose computer activities interfere with productivity.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
authentication that requires more than one form of verification for a user to be granted access
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
network protocols that encapsulate (wrap)one protocol or session inside another
سؤال
____________________ risk is the amount of risk left over after countermeasures are implemented.
سؤال
By providing _________________ through backup systems,you ensure information remains accessible if primary systems go offline.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
situations or conditions that increase threats,which in turn increase risk
سؤال
The process called _____________ analysis determines the threats an organization faces.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a method of authentication that grants users limited system access based on their assigned role in the company
سؤال
The portion of a security policy that describes who responds when there has been a security breach is called the ______________ response section.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a process of analyzing the threats an organization faces
سؤال
Search warrants and subpoenas were developed in response to the _____________ Amendment which protects U.S.residents against illegal search and seizure.
سؤال
SNA starts with the assumption that a system or network will be ________________.
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a legal document issued by a court that allows authorities to search a particular place for specific evidence
سؤال
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a legal document that requires a person to appear in court,provide testimony, or cooperate with law enforcement
سؤال
What is the purpose of a privileged access policy?
سؤال
When should you update the security policy?
سؤال
Describe a remote access and wireless connection policy and the use of role-based authentication.Include two-factor authentication in your discussion.
سؤال
What are three questions you should ask in deciding how your organization should perform risk analysis?
سؤال
What points should a third-party access policy include? List at least three.
سؤال
What are the three levels of escalation of threat or security incidents? Describe them.
سؤال
What should you do if a security policy violation involves a criminal offense? Include the Fourth Amendment in your discussion.
سؤال
What are three areas in which the use of encryption should be considered to maintain confidentiality?
سؤال
What are the four steps of Threat and Risk Assessment?
سؤال
What is a server security policy? List at least three areas the policy should address.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Security Policy Design and Implementation
1
Which of the following shows how devices are connected and includes an IP allocation register?

A) hardware inventory
B) topology map
C) asset table
D) security policy
B
2
Which of the following is NOT a step in threat and risk assessment?

A) Asset definition
B) Recommendation
C) Resolution
D) Threat assessment
C
3
Which of the following would be considered a vulnerability?

A) installation of a firewall
B) antivirus software
C) Internet-connected computer
D) spyware
C
4
Which best defines residual risk?

A) risk that occurs as a result of new vulnerabilities
B) the amount of risk remaining after countermeasures are implemented
C) a vulnerability for which the risk has been reduced to zero
D) the cost of implementing solutions to an assessed risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is a network's ability to detect attacks when they occur and to evaluate the extent of damage and compromise?

A) resistance
B) recovery
C) recognition
D) reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which is best defined as the ability of a system to continue operations despite a failure?

A) fault tolerance
B) survivability analysis
C) reliability audit
D) adaptation and evolution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
The process of reviewing records of network computer activity is called which of the following?

A) monitoring
B) archiving
C) auditing
D) recording
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
An extranet is a backup network that you can use if the main network fails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The first step in SNA is the survivability analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Once written,a security policy should not be altered so that you can maintain consistency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is considered the first step in formulating a security policy?

A) risk analysis
B) elimination of threats
C) risk reduction
D) system monitoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The first phase of the system development life cycle is needs assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The people that manage security for the organization should not be same people that conduct risk analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is NOT a phase in the system development life cycle?

A) needs assessment
B) security audit
C) system implementation
D) performance monitoring
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT among the six factors needed to create a risk analysis?

A) threats
B) consequences
C) personnel profiles
D) probabilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following requires you to assist police by appearing in court or producing evidence?

A) subpoena
B) search warrant
C) the 4th amendment
D) de facto agent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following best describes a Monte Carlo simulation?

A) a technique for simulating an attack on a system
B) a formula that estimates the cost of countermeasures
C) a procedural system that simulates a catastrophe
D) an analytical method that simulates a real-life system for risk analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is considered an asset?

A) hacker
B) unpatched Web server
C) disgruntled employee
D) intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following best describes ROI?

A) the chance that a threat will result in lost money
B) how long before an investment will pay for itself
C) the cost of mitigating a threat
D) the benefits of setting security priorities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following defines how employees should use the organization's computing resources?

A) Network and Internet Policy
B) Email and Spam Policy
C) Computing and Resource Policy
D) Acceptable Use Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Your exposure to risk increases if your organization has one or more factors that increase _____________ probabilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a private network that a company sets up as an extension of its corporate intranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
The __________________ phase of the system development life cycle can lead you to the needs assessment phase where the cycle begins again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
VPNs create a _____________ to transport information through public communications media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
routers,cables,bastion hosts,servers,and firewall components that enable employees to communicate with one another
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a document that details additional access options and responsibilities of users with privileged access to resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
________________ clauses exist in acceptable use policies so that companies can discipline employees whose computer activities interfere with productivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
authentication that requires more than one form of verification for a user to be granted access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
network protocols that encapsulate (wrap)one protocol or session inside another
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ risk is the amount of risk left over after countermeasures are implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
By providing _________________ through backup systems,you ensure information remains accessible if primary systems go offline.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
situations or conditions that increase threats,which in turn increase risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
The process called _____________ analysis determines the threats an organization faces.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a method of authentication that grants users limited system access based on their assigned role in the company
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The portion of a security policy that describes who responds when there has been a security breach is called the ______________ response section.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a process of analyzing the threats an organization faces
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Search warrants and subpoenas were developed in response to the _____________ Amendment which protects U.S.residents against illegal search and seizure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
SNA starts with the assumption that a system or network will be ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a legal document issued by a court that allows authorities to search a particular place for specific evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
MATCHING
a.extranet
b.network assets
c.privileged access policy
d.risk management
e.role-based authentication
f.search warrant
g.subpoena
h.tunneling protocols
i.two-factor authentication
j.vulnerabilities
a legal document that requires a person to appear in court,provide testimony, or cooperate with law enforcement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the purpose of a privileged access policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
When should you update the security policy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe a remote access and wireless connection policy and the use of role-based authentication.Include two-factor authentication in your discussion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are three questions you should ask in deciding how your organization should perform risk analysis?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What points should a third-party access policy include? List at least three.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the three levels of escalation of threat or security incidents? Describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What should you do if a security policy violation involves a criminal offense? Include the Fourth Amendment in your discussion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are three areas in which the use of encryption should be considered to maintain confidentiality?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What are the four steps of Threat and Risk Assessment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is a server security policy? List at least three areas the policy should address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.