Deck 1: Contingency Planning Within Information Security

ملء الشاشة (f)
exit full mode
سؤال
A(n)____ is a category of objects,persons,or other entities that pose a potential risk of loss to an asset.

A)payload
B)intellectual property
C)Trojan horse
D)threat
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ has been the industry standard for computer security since the development of the mainframe.

A)disaster recovery plan
B)C.I.A.triangle
C)strategic plan
D)asset classification
سؤال
____ is the control approach that attempts to shift the risk to other assets,other processes,or other organizations.

A)Transference
B)Mitigation
C)Acceptance
D)Avoidance
سؤال
____ ensures that only those with the rights and privileges to access information are able to do so.

A)Confidentiality
B)Availability
C)Integrity
D)Risk assessment
سؤال
An asset can be logical,such as a Web site,information,or data;or an asset can be physical,such as a person,computer system,or other tangible object.
سؤال
A ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it to shut down.

A)Trojan horse
B)DoS
C)social engineering
D)spyware
سؤال
____ enables authorized users - persons or computer systems - to access information without interference or obstruction,and to receive it in the required format.

A)Integrity
B)Availability
C)Confidentiality
D)Risk assessment
سؤال
A(n)____ is prepared by the organization to anticipate,react to,and recover from events that threaten the security of information and information assets in the organization,and,subsequently,to restore the organization to normal modes of business operations.

A)threat
B)social plan
C)contingency plan
D)asset
سؤال
An information security policy provides rules for the protection of the information assets of the organization.
سؤال
____ hack systems to conduct terrorist activities through network or Internet pathways.

A)Cyberterrorists
B)Script kiddies
C)Programmers
D)Social engineers
سؤال
____ is the process of examining and documenting the security posture of an organization's information technology and the risks it faces.

A)Risk identification
B)Data classification
C)Security clearance
D)DR
سؤال
____ of risk is the choice to do nothing to protect a vulnerability,and to accept the outcome of its exploitation.

A)Inheritance
B)Acceptance
C)Avoidance
D)Mitigation
سؤال
IRP focuses more on preparations completed before and actions taken after the incident,whereas DRP focuses on intelligence gathering,information analysis,coordinated decision making,and urgent,concrete actions.
سؤال
The vision of an organization is a written statement of an organization's purpose.
سؤال
____ is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

A)Avoidance
B)Transference
C)Acceptance
D)Mitigation
سؤال
____ is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas".

A)Avoidance
B)Trojan horse
C)Malware
D)Intellectual property
سؤال
____ assigns a risk rating or score to each information asset.While this number does not mean anything in absolute terms,it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.

A)BC
B)Risk assessment
C)DR
D)Avoidance
سؤال
____ is the risk control strategy that attempts to prevent the exploitation of the vulnerability.

A)Acceptance
B)Transference
C)Avoidance
D)Mitigation
سؤال
Once intellectual property (IP)has been defined and properly identified,breaches in the controls that have been placed around the IP constitute a threat to the security of this information.
سؤال
The threat of corruption can occur while information is being stored or transmitted.____ is the prevention of that corruption.

A)Risk assessment
B)Availability
C)Integrity
D)Confidentiality
سؤال
A(n)____ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions,take actions,and perform other duties on behalf of the organization.

A)policy
B)assessment
C)asset
D)residual risk
سؤال
Match each statement with an item below.

-The risk that remains to the information asset even after the existing control has been applied.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Match each statement with an item below.

-The probability that a specific vulnerability within an organization will be successfully attacked.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Match each statement with an item below.

-Segments of code that perform malicious actions.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Information has the characteristic of ____________________ when disclosure or exposure to unauthorized individuals or systems is prevented.
سؤال
Match each statement with an item below.

-A person who uses and creates computer software to gain access to information illegally.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Match each statement with an item below.

-Something that looks like a desirable program or tool,but that is in fact a malicious entity.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
____________________ is the process of applying controls to reduce the risks to an organization's data and information systems.
سؤال
A(n)____ is an investigation and assessment of the impact that various attacks can have on the organization.

A)BIA
B)intellectual property
C)incident
D)threat
سؤال
____________________ is the process of identifying vulnerabilities in an organization's information systems and taking carefully reasoned steps to ensure the confidentiality,integrity,and availability of all the components in the organization's information system.
سؤال
____ is the process of moving the organization toward its vision.

A)Transference
B)Avoidance
C)Strategic planning
D)Mitigation
سؤال
A ____ deals with the preparation for and recovery from a disaster,whether natural or man-made.

A)mitigation plan
B)disaster recovery plan
C)risk management
D)risk assessment
سؤال
A(n)____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality,integrity,or availability.

A)threat
B)Trojan horse
C)worm
D)incident
سؤال
Match each statement with an item below.

-Detailed statements of what must be done to comply with policy.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
For the purpose of relative risk assessment,____________________ equals likelihood of vulnerability occurrence times value (or impact)minus percentage risk already controlled plus an element of uncertainty.
سؤال
Match each statement with an item below.

-The process used to identify and then control risks to an organization's information assets.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Match each statement with an item below.

-A specific and identifiable instance of a general threat.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
Match each statement with an item below.

-Includes trade secrets,copyrights,trademarks,and patents.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
سؤال
____________________ is defined by the Committee on National Security Systems (CNSS)as the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.
سؤال
A ____ is a document that expresses how an organization ensures that critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site if a catastrophic incident or disaster occurs.

A)risk assessment plan
B)business continuity plan
C)Trojan horse
D)worm
سؤال
Once the project team for information security development creates a ranked vulnerability worksheet,the team must choose one of four basic strategies to control each of the risks that result from these vulnerabilities.List the four strategies.
سؤال
What is the difference between a disaster recovery plan and a business continuity plan?
سؤال
What are some of the criteria to be considered when conducting an information asset valuation?
سؤال
What is difference between access control lists and configuration rules?
سؤال
What is a polymorphic threat?
سؤال
What are some of the key elements that a security policy should have in order to remain viable?
سؤال
What are the subordinate functions of contingency planning?
سؤال
What are the steps in contingency planning?
سؤال
What is the difference between avoidance of risk and acceptance of risk?
سؤال
What is the difference between transference and mitigation?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Contingency Planning Within Information Security
1
A(n)____ is a category of objects,persons,or other entities that pose a potential risk of loss to an asset.

A)payload
B)intellectual property
C)Trojan horse
D)threat
D
2
The ____ has been the industry standard for computer security since the development of the mainframe.

A)disaster recovery plan
B)C.I.A.triangle
C)strategic plan
D)asset classification
B
3
____ is the control approach that attempts to shift the risk to other assets,other processes,or other organizations.

A)Transference
B)Mitigation
C)Acceptance
D)Avoidance
A
4
____ ensures that only those with the rights and privileges to access information are able to do so.

A)Confidentiality
B)Availability
C)Integrity
D)Risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
An asset can be logical,such as a Web site,information,or data;or an asset can be physical,such as a person,computer system,or other tangible object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it to shut down.

A)Trojan horse
B)DoS
C)social engineering
D)spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ enables authorized users - persons or computer systems - to access information without interference or obstruction,and to receive it in the required format.

A)Integrity
B)Availability
C)Confidentiality
D)Risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n)____ is prepared by the organization to anticipate,react to,and recover from events that threaten the security of information and information assets in the organization,and,subsequently,to restore the organization to normal modes of business operations.

A)threat
B)social plan
C)contingency plan
D)asset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
An information security policy provides rules for the protection of the information assets of the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ hack systems to conduct terrorist activities through network or Internet pathways.

A)Cyberterrorists
B)Script kiddies
C)Programmers
D)Social engineers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ is the process of examining and documenting the security posture of an organization's information technology and the risks it faces.

A)Risk identification
B)Data classification
C)Security clearance
D)DR
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ of risk is the choice to do nothing to protect a vulnerability,and to accept the outcome of its exploitation.

A)Inheritance
B)Acceptance
C)Avoidance
D)Mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
IRP focuses more on preparations completed before and actions taken after the incident,whereas DRP focuses on intelligence gathering,information analysis,coordinated decision making,and urgent,concrete actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
The vision of an organization is a written statement of an organization's purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

A)Avoidance
B)Transference
C)Acceptance
D)Mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas".

A)Avoidance
B)Trojan horse
C)Malware
D)Intellectual property
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ assigns a risk rating or score to each information asset.While this number does not mean anything in absolute terms,it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.

A)BC
B)Risk assessment
C)DR
D)Avoidance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ is the risk control strategy that attempts to prevent the exploitation of the vulnerability.

A)Acceptance
B)Transference
C)Avoidance
D)Mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Once intellectual property (IP)has been defined and properly identified,breaches in the controls that have been placed around the IP constitute a threat to the security of this information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The threat of corruption can occur while information is being stored or transmitted.____ is the prevention of that corruption.

A)Risk assessment
B)Availability
C)Integrity
D)Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)____ is a plan or course of action used by an organization to convey instructions from its senior-most management to those who make decisions,take actions,and perform other duties on behalf of the organization.

A)policy
B)assessment
C)asset
D)residual risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match each statement with an item below.

-The risk that remains to the information asset even after the existing control has been applied.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each statement with an item below.

-The probability that a specific vulnerability within an organization will be successfully attacked.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each statement with an item below.

-Segments of code that perform malicious actions.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Information has the characteristic of ____________________ when disclosure or exposure to unauthorized individuals or systems is prevented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each statement with an item below.

-A person who uses and creates computer software to gain access to information illegally.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each statement with an item below.

-Something that looks like a desirable program or tool,but that is in fact a malicious entity.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
____________________ is the process of applying controls to reduce the risks to an organization's data and information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n)____ is an investigation and assessment of the impact that various attacks can have on the organization.

A)BIA
B)intellectual property
C)incident
D)threat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
____________________ is the process of identifying vulnerabilities in an organization's information systems and taking carefully reasoned steps to ensure the confidentiality,integrity,and availability of all the components in the organization's information system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ is the process of moving the organization toward its vision.

A)Transference
B)Avoidance
C)Strategic planning
D)Mitigation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ____ deals with the preparation for and recovery from a disaster,whether natural or man-made.

A)mitigation plan
B)disaster recovery plan
C)risk management
D)risk assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n)____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality,integrity,or availability.

A)threat
B)Trojan horse
C)worm
D)incident
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match each statement with an item below.

-Detailed statements of what must be done to comply with policy.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
For the purpose of relative risk assessment,____________________ equals likelihood of vulnerability occurrence times value (or impact)minus percentage risk already controlled plus an element of uncertainty.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each statement with an item below.

-The process used to identify and then control risks to an organization's information assets.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match each statement with an item below.

-A specific and identifiable instance of a general threat.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match each statement with an item below.

-Includes trade secrets,copyrights,trademarks,and patents.

A)Threat agent
B)Intellectual property
C)Hacker
D)Computer viruses
E)Trojan
F)Risk management
G)Likelihood
H)Residual risk
I)Standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
____________________ is defined by the Committee on National Security Systems (CNSS)as the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A ____ is a document that expresses how an organization ensures that critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site if a catastrophic incident or disaster occurs.

A)risk assessment plan
B)business continuity plan
C)Trojan horse
D)worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Once the project team for information security development creates a ranked vulnerability worksheet,the team must choose one of four basic strategies to control each of the risks that result from these vulnerabilities.List the four strategies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is the difference between a disaster recovery plan and a business continuity plan?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are some of the criteria to be considered when conducting an information asset valuation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is difference between access control lists and configuration rules?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is a polymorphic threat?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are some of the key elements that a security policy should have in order to remain viable?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the subordinate functions of contingency planning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are the steps in contingency planning?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is the difference between avoidance of risk and acceptance of risk?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is the difference between transference and mitigation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.