Deck 12: Information Security Maintenance

ملء الشاشة (f)
exit full mode
سؤال
The target selection step involves using the external monitoring intelligence to configure a test engine (such as Nessus)for the tests to be performed.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Over time,policies and procedures may become inadequate because of changes in agency mission and operational requirements,threats,or the environment.
سؤال
Often,US-CERT is viewed as the definitive authority for computer emergency response teams.
سؤال
A maintenance model such as the ISO model deals with methods to manage and operate systems.
سؤال
An effective security program demands comprehensive and continuous understanding of program and system configuration.
سؤال
Documentation procedures are not required for configuration and change management processes.
سؤال
When the amount of data stored on a particular hard drive averages 30-40% of available capacity for a prolonged period,consider an upgrade for the hard drive.
سؤال
Remediation of vulnerabilities can be accomplished by accepting or transferring the risk,removing the threat,or repairing the vulnerability.
سؤال
Over time,external monitoring processes should capture information about the external environment in a format that can be referenced both across the organization as threats emerge and for historical use.
سؤال
All systems that are mission critical should be enrolled in PSV measurement.
سؤال
Court decisions generally do not impact agency policy.
سؤال
The value of internal monitoring is low when the resulting knowledge of the network and systems configuration is fed into the vulnerability assessment and remediation maintenance domain.
سؤال
All telephone numbers controlled by an organization should be tested for modem vulnerability,unless the configuration of the phone equipment on premises can assure that no number can be dialed from the worldwide telephone system.
سؤال
Many publicly accessible information sources,both mailing lists and Web sites,are available to those organizations and individuals who have the time,expertise,and finances to make use of them.
سؤال
The characteristics concerned with manufacturer and software versions are about technical functionality,and they should be kept highly accurate and up-to-date.
سؤال
Digital forensics helps the organization understand what happened and how.
سؤال
External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.
سؤال
If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment,the existing security improvement program will probably continue to work well.
سؤال
An intranet scan starts with an Internet search engine.
سؤال
The vulnerability database,like the risk,threat,and attack database,both stores and tracks information.
سؤال
Organizations should have a carefully planned and fully populated inventory of all their network devices,communication channels,and computing devices._________________________
سؤال
The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses._________________________
سؤال
Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization._________________________
سؤال
Major planning components should be reviewed on a periodic basis to ensure that they are current,accurate,and appropriate.
سؤال
UN-CERT is a set of moderated mailing lists full of detailed,full-disclosure discussions and announcements about computer security vulnerabilities._________________________
سؤال
CM assists in streamlining change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen._________________________
سؤال
Each phase of the SDLC includes a(n)maximum set of information security-related activities required to effectively incorporate security into a system._________________________
سؤال
ISO 27001 Information Security Handbook: A Guide for Managers provides managerial guidance for the establishment and implementation of an information security program._________________________
سؤال
Tracking awareness involves assessing the status of the program as indicated by the database information and mapping it to standards established by the agency._________________________
سؤال
To be put to the most effective use,the information that comes from the IDPS must be integrated into the inventory process._________________________
سؤال
Threats cannot be removed without requiring a repair of the vulnerability.
سؤال
Policy needs to be reviewed and refreshed from time to time to ensure that it's sound.
سؤال
For configuration management (CM)and control,it is important to document the proposed or actual changes in the security plan of the system._________________________
سؤال
Rehearsal adds value by exercising the procedures,identifying shortcomings,and providing security personnel the opportunity to improve the security plan before it is needed.
سؤال
In some organizations,facilities management is the identification,inventory,and documentation of the current information systems status-hardware,software,and networking configurations._________________________
سؤال
The basic function of the external monitoring process is to monitor activity,report results,and escalate warnings._________________________
سؤال
CERTs stands for computer emergency recovery teams._________________________
سؤال
A trouble ticket is closed when a user calls about an issue._________________________
سؤال
An effective information security governance program requires constant change._________________________
سؤال
In some instances,risk is acknowledged as being part of an organization's business process.
سؤال
The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand._________________________
سؤال
The ____ is a center of Internet security expertise and is located at the Software Engineering Institute,a federally funded research and development center operated by Carnegie Mellon University.

A)Bug/CERT
B)Bugtraq/CERT
C)CC/CERT
D)CERT/CC
سؤال
The final process in the vulnerability assessment and remediation domain is the exit phase._________________________
سؤال
The ____ list is intended to facilitate the development of a free network exploration tool.

A)Nmap-hackers
B)Packet Storm
C)Security Focus
D)Snort-sigs
سؤال
WLAN stands for wide local area network._________________________
سؤال
A(n)war game puts a subset of plans in place to create a realistic test environment._________________________
سؤال
The primary mailing list,called simply ____,provides time-sensitive coverage of emerging vulnerabilities,documenting how they are exploited,and reporting on how to remediate them.Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.

A)Bug
B)Bugfix
C)Buglist
D)Bugtraq
سؤال
A(n)____ item is a hardware or software item that is to be modified and revised throughout its life cycle.

A)revision
B)update
C)change
D)configuration
سؤال
When possible,major plan elements should be rehearsed._________________________
سؤال
The internal vulnerability assessment is usually performed against all public-facing addresses,using every possible penetration testing approach._________________________
سؤال
When the memory usage associated with a particular CPU-based system averages ____% or more over prolonged periods,consider adding more memory.

A)30
B)60
C)90
D)100
سؤال
You can document the results of the verification by saving a(n)profile._________________________
سؤال
____ baselines are established for network traffic and also for firewall performance and IDPS performance.

A)System
B)Application
C)Performance
D)Environment
سؤال
____ are a component of the security triple.

A)Threats
B)Assets
C)Vulnerabilities
D)All of the above
سؤال
The optimum solution in most cases is to repair a(n)vulnerability._________________________
سؤال
An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked._________________________
سؤال
To evaluate the performance of a security system,administrators must establish system performance ____.

A)baselines
B)profiles
C)maxima
D)means
سؤال
The ____ commercial site focuses on current security tool resources.

A)Nmap-hackers
B)Packet Storm
C)Security Laser
D)Snort-sigs
سؤال
The process of identifying and documenting specific and provable flaws in the organization's information asset environment is called VA._________________________
سؤال
A ____ is the recorded state of a particular revision of a software or hardware configuration item.

A)state
B)version
C)configuration
D)baseline
سؤال
There are ____ common vulnerability assessment processes.

A)two
B)three
C)four
D)five
سؤال
Detailed ____ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.

A)escalation
B)intelligence
C)monitoring
D)elimination
سؤال
As an alternative view of the way data flows into the monitoring process,a(n)____ approach may prove useful.

A)DTD
B)DFD
C)Schema
D)ERP
سؤال
The ____ vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organization's networks.

A)modem
B)phone
C)dial-up
D)network
سؤال
The optimum approach for escalation is based on a thorough integration of the monitoring process into the ____.

A)IDE
B)CERT
C)ERP
D)IRP
سؤال
A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared.
سؤال
The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.

A)intranet
B)Internet
C)LAN
D)WAN
سؤال
____________________ is the process of reviewing the use of a system,not to check performance,but rather to determine if misuse or malfeasance has occurred.
سؤال
The steps of the Internet vulnerability assessment include ____,which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

A)scanning
B)target selection
C)test selection
D)analysis
سؤال
As the help desk personnel screen problems,they must also track the activities involved in resolving each complaint in a help desk ____________________ system.
سؤال
Virtually all aspects of a company's environment are ____________________.
سؤال
____ allows for the major planning components to be reviewed on a periodic basis to ensure that they are current,accurate,and appropriate.

A)System review
B)Project review
C)Program review
D)Application review
سؤال
Organizations should perform a(n)____________________ assessment of their information security programs.
سؤال
____ pen testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.

A)White box
B)Black box
C)Gray box
D)Green box
سؤال
____ is used to respond to network change requests and network architectural design proposals.

A)Network connectivity RA
B)Dialed modem RA
C)Application RA
D)Vulnerability RA
سؤال
The ____ mailing list includes announcements and discussion of an open-source IDPS.

A)Nmap-hackers
B)Packet Storm
C)Security Focus
D)Snort-sigs
سؤال
One approach that can improve the situational awareness of the information security function uses a process known as ____ to quickly identify changes to the internal environment.

A)baseline
B)difference analysis
C)differential
D)revision
سؤال
The ____ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization.

A)ASP
B)ISP
C)SVP
D)PSV
سؤال
A(n)____ is a statement of the boundaries of the RA.

A)scope
B)disclaimer
C)footer
D)head
سؤال
____,a level beyond vulnerability testing,is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A)Penetration testing
B)Penetration simulation
C)Attack simulation
D)Attack testing
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/103
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Information Security Maintenance
1
The target selection step involves using the external monitoring intelligence to configure a test engine (such as Nessus)for the tests to be performed.
False
2
Over time,policies and procedures may become inadequate because of changes in agency mission and operational requirements,threats,or the environment.
True
3
Often,US-CERT is viewed as the definitive authority for computer emergency response teams.
True
4
A maintenance model such as the ISO model deals with methods to manage and operate systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
5
An effective security program demands comprehensive and continuous understanding of program and system configuration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
6
Documentation procedures are not required for configuration and change management processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
7
When the amount of data stored on a particular hard drive averages 30-40% of available capacity for a prolonged period,consider an upgrade for the hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
8
Remediation of vulnerabilities can be accomplished by accepting or transferring the risk,removing the threat,or repairing the vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
9
Over time,external monitoring processes should capture information about the external environment in a format that can be referenced both across the organization as threats emerge and for historical use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
10
All systems that are mission critical should be enrolled in PSV measurement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
11
Court decisions generally do not impact agency policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
12
The value of internal monitoring is low when the resulting knowledge of the network and systems configuration is fed into the vulnerability assessment and remediation maintenance domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
13
All telephone numbers controlled by an organization should be tested for modem vulnerability,unless the configuration of the phone equipment on premises can assure that no number can be dialed from the worldwide telephone system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
14
Many publicly accessible information sources,both mailing lists and Web sites,are available to those organizations and individuals who have the time,expertise,and finances to make use of them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
15
The characteristics concerned with manufacturer and software versions are about technical functionality,and they should be kept highly accurate and up-to-date.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
16
Digital forensics helps the organization understand what happened and how.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
17
External monitoring entails collecting intelligence from various data sources and then giving that intelligence context and meaning for use by decision makers within the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
18
If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment,the existing security improvement program will probably continue to work well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
19
An intranet scan starts with an Internet search engine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
20
The vulnerability database,like the risk,threat,and attack database,both stores and tracks information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
21
Organizations should have a carefully planned and fully populated inventory of all their network devices,communication channels,and computing devices._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
22
The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all of the organization's networks,information systems,and information security defenses._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
23
Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
24
Major planning components should be reviewed on a periodic basis to ensure that they are current,accurate,and appropriate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
25
UN-CERT is a set of moderated mailing lists full of detailed,full-disclosure discussions and announcements about computer security vulnerabilities._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
26
CM assists in streamlining change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
27
Each phase of the SDLC includes a(n)maximum set of information security-related activities required to effectively incorporate security into a system._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
28
ISO 27001 Information Security Handbook: A Guide for Managers provides managerial guidance for the establishment and implementation of an information security program._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
29
Tracking awareness involves assessing the status of the program as indicated by the database information and mapping it to standards established by the agency._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
30
To be put to the most effective use,the information that comes from the IDPS must be integrated into the inventory process._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
31
Threats cannot be removed without requiring a repair of the vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
32
Policy needs to be reviewed and refreshed from time to time to ensure that it's sound.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
33
For configuration management (CM)and control,it is important to document the proposed or actual changes in the security plan of the system._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
34
Rehearsal adds value by exercising the procedures,identifying shortcomings,and providing security personnel the opportunity to improve the security plan before it is needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
35
In some organizations,facilities management is the identification,inventory,and documentation of the current information systems status-hardware,software,and networking configurations._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
36
The basic function of the external monitoring process is to monitor activity,report results,and escalate warnings._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
37
CERTs stands for computer emergency recovery teams._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
38
A trouble ticket is closed when a user calls about an issue._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
39
An effective information security governance program requires constant change._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
40
In some instances,risk is acknowledged as being part of an organization's business process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
41
The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
42
The ____ is a center of Internet security expertise and is located at the Software Engineering Institute,a federally funded research and development center operated by Carnegie Mellon University.

A)Bug/CERT
B)Bugtraq/CERT
C)CC/CERT
D)CERT/CC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
43
The final process in the vulnerability assessment and remediation domain is the exit phase._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ____ list is intended to facilitate the development of a free network exploration tool.

A)Nmap-hackers
B)Packet Storm
C)Security Focus
D)Snort-sigs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
45
WLAN stands for wide local area network._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
46
A(n)war game puts a subset of plans in place to create a realistic test environment._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
47
The primary mailing list,called simply ____,provides time-sensitive coverage of emerging vulnerabilities,documenting how they are exploited,and reporting on how to remediate them.Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.

A)Bug
B)Bugfix
C)Buglist
D)Bugtraq
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
48
A(n)____ item is a hardware or software item that is to be modified and revised throughout its life cycle.

A)revision
B)update
C)change
D)configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
49
When possible,major plan elements should be rehearsed._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
50
The internal vulnerability assessment is usually performed against all public-facing addresses,using every possible penetration testing approach._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
51
When the memory usage associated with a particular CPU-based system averages ____% or more over prolonged periods,consider adding more memory.

A)30
B)60
C)90
D)100
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
52
You can document the results of the verification by saving a(n)profile._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ baselines are established for network traffic and also for firewall performance and IDPS performance.

A)System
B)Application
C)Performance
D)Environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
54
____ are a component of the security triple.

A)Threats
B)Assets
C)Vulnerabilities
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
55
The optimum solution in most cases is to repair a(n)vulnerability._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
56
An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
57
To evaluate the performance of a security system,administrators must establish system performance ____.

A)baselines
B)profiles
C)maxima
D)means
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
58
The ____ commercial site focuses on current security tool resources.

A)Nmap-hackers
B)Packet Storm
C)Security Laser
D)Snort-sigs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
59
The process of identifying and documenting specific and provable flaws in the organization's information asset environment is called VA._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
60
A ____ is the recorded state of a particular revision of a software or hardware configuration item.

A)state
B)version
C)configuration
D)baseline
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
61
There are ____ common vulnerability assessment processes.

A)two
B)three
C)four
D)five
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
62
Detailed ____ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.

A)escalation
B)intelligence
C)monitoring
D)elimination
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
63
As an alternative view of the way data flows into the monitoring process,a(n)____ approach may prove useful.

A)DTD
B)DFD
C)Schema
D)ERP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
64
The ____ vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organization's networks.

A)modem
B)phone
C)dial-up
D)network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
65
The optimum approach for escalation is based on a thorough integration of the monitoring process into the ____.

A)IDE
B)CERT
C)ERP
D)IRP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
66
A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
67
The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.

A)intranet
B)Internet
C)LAN
D)WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
68
____________________ is the process of reviewing the use of a system,not to check performance,but rather to determine if misuse or malfeasance has occurred.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
69
The steps of the Internet vulnerability assessment include ____,which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

A)scanning
B)target selection
C)test selection
D)analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
70
As the help desk personnel screen problems,they must also track the activities involved in resolving each complaint in a help desk ____________________ system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
71
Virtually all aspects of a company's environment are ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
72
____ allows for the major planning components to be reviewed on a periodic basis to ensure that they are current,accurate,and appropriate.

A)System review
B)Project review
C)Program review
D)Application review
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
73
Organizations should perform a(n)____________________ assessment of their information security programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
74
____ pen testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.

A)White box
B)Black box
C)Gray box
D)Green box
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
75
____ is used to respond to network change requests and network architectural design proposals.

A)Network connectivity RA
B)Dialed modem RA
C)Application RA
D)Vulnerability RA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
76
The ____ mailing list includes announcements and discussion of an open-source IDPS.

A)Nmap-hackers
B)Packet Storm
C)Security Focus
D)Snort-sigs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
77
One approach that can improve the situational awareness of the information security function uses a process known as ____ to quickly identify changes to the internal environment.

A)baseline
B)difference analysis
C)differential
D)revision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
78
The ____ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization.

A)ASP
B)ISP
C)SVP
D)PSV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
79
A(n)____ is a statement of the boundaries of the RA.

A)scope
B)disclaimer
C)footer
D)head
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
80
____,a level beyond vulnerability testing,is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

A)Penetration testing
B)Penetration simulation
C)Attack simulation
D)Attack testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 103 في هذه المجموعة.