Deck 12: Managing Systems Support and Security

Full screen (f)
exit full mode
Question
In dumpster diving attacks,an intruder raids desks or trash bins for valuable information.
Use Space or
up arrow
down arrow
to flip the card.
Question
The main objective of training is to show users how the system can help them perform their jobs.
Question
Bandwidth requirements are expressed in bytes per minute.
Question
In a public key encryption environment,each user on the network has a pair of keys: a foreign key and a private key.
Question
Acceptance means that nothing is done;companies usually accept a risk only when the protection clearly is not worth the expense.
Question
A continuous backup only backs up files that are new or changed since the last full backup.
Question
A test site is an alternate IT location,anywhere in the world,that can support critical systems in the event of a power outage,system crash,or physical catastrophe.
Question
Retention periods of backups can be a specific number of months or years,depending on legal requirements and company policy.
Question
Wrapping refers to the practice of storing backup media away from the main business location,in order to mitigate the risk of a catastrophic disaster,such as a flood,fire,or earthquake.
Question
As enterprise-wide information systems grow more complex,configuration management becomes trivial.
Question
In a secluded engineering attack,an intruder uses social interaction to gain access to a computer system.
Question
Mitigation shifts the risk to another asset or party,such as an insurance company.
Question
Hard skills include communications,interpersonal,and perceptive abilities.
Question
Maintenance expense stay consistently the same during the system's operational life.
Question
A system in its final stages requires corrective maintenance only to keep the system operational.
Question
In a broad sense,credentials include formal degrees,diplomas,or certificates granted by learning institutions to show that a certain level of education has been achieved.
Question
Software leases are not considered an operational cost.
Question
Cloud computing provides the IT infrastructure that enables service orientation.
Question
One highly publicized form of social engineering is called post texting,which is a method of obtaining personal information under false pretenses.
Question
The hardening process that makes a system more secure is fully automatic.
Question
_____ include changing programs,procedures,or documentation to ensure correct system performance;adapting the system to changing requirements;and making the system operate more efficiently.

A) Team building activities
B) Elicitation activities
C) Maintenance activities
D) Testing activities
Question
Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
Question
Preventative maintenance adds new capability and enhancements.
Question
Corrective maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Question
Adaptive maintenance involves changing an operational system to make it more efficient,reliable,or maintainable.
Question
_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.

A) Secure
B) Maintenance
C) Principal
D) Capital
Question
Adaptive maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Question
A help desk can boost its productivity by using _____,which allows IT staff to take over a user's workstation and provide support and troubleshooting.

A) high-level synthesis
B) wireless fidelity
C) word editing software
D) remote control software
Question
When a user submits a maintenance request,the system administrator makes an initial determination.
Question
Backup media can include tape,hard drives,optical storage,and online storage.
Question
When a maintenance release methodology is used,all changes,critical and noncritical,are implemented consecutively as they arrive.
Question
Perfective maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Question
The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

A) implementation
B) verification
C) security
D) testing
Question
Using a release methodology reduces the documentation burden.
Question
_____ costs include expenses for items such as supplies and equipment rental.

A) Operational
B) Corrective
C) Maintenance
D) Adaptive
Question
A _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.

A) help desk
B) white spot
C) maintenance software module
D) utility point
Question
A patch is a specially written software module that provides temporary repairs so operations can resume.
Question
An incremental backup only includes recent files that have never been backed up by any method.
Question
When network traffic is encrypted,it is invisible and its content and purpose are masked.
Question
If significant changes take place in an existing system or if a new version is released,the IT department might develop a _____.

A) user training package
B) user presence software
C) maintenance module
D) utility index
Question
In a typical system,the initial version of the system is 1.0,and the release that includes the first set of maintenance changes is version _____.

A) 2.1
B) 1.1
C) 0.1
D) 2.1
Question
When a new version of a system is installed,the prior release is _____,or stored.

A) archived
B) deleted
C) discontinued
D) reinstalled
Question
To measure system performance,companies use _____,which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.

A) metric analysis
B) benchmark testing
C) threat analysis
D) allocation testing
Question
In maintenance management,_____ involves studying the parts of a system to understand the overall system.

A) synthesis
B) adoption
C) fusion
D) elucidation
Question
In addition to benchmark testing,performance measurements,called _____,can monitor the number of transactions processed in a given time period,the number of records accessed,and the volume of online data.

A) metrics
B) wireframes
C) viewports
D) baselines
Question
Many IT departments use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

A) tester/programmer
B) strategist/analyst
C) programmer/analyst
D) designer/debugger
Question
_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.

A) Throughput
B) Resolution
C) Dimensionality
D) Latency
Question
The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

A) functional baseline
B) operational baseline
C) allocated baseline
D) product baseline
Question
Perfective maintenance usually is cost effective _____ a system's operational life.

A) early in
B) during the middle of
C) during the end of
D) throughout
Question
_____ is the overall time between a request for system activity and the delivery of the response.

A) Response time
B) Throughput time
C) Refresh rate
D) Base rate
Question
_____ describes the amount of data that a system can transfer in a fixed time period.

A) Latency
B) Resolution
C) Dimensionality
D) Bandwidth
Question
_____ includes monitoring a system for signs of trouble,logging all system failures,diagnosing the problem,and applying corrective action.

A) Benchmark testing
B) Throughput management
C) Responsive testing
D) Fault management
Question
A _____ is a formal reference point that measures system characteristics at a specific time.

A) feature line
B) baseline
C) product point
D) viewport
Question
_____ is the process of tracking system releases.

A) Configuration control
B) Version control
C) Source control
D) Quality control
Question
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.

A) tester
B) programmer
C) system validator
D) system administrator
Question
_____ is a process for controlling changes in system requirements during software development.

A) Data management
B) Disk management
C) Configuration management
D) Email management
Question
To avoid problems,preventive maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) requires analysis of areas where trouble is likely to occur
Question
The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

A) functional baseline
B) extension baseline
C) allocated baseline
D) product baseline
Question
The _____ documents a system at the end of the design phase,identifies any changes since the beginning of the project,and includes testing and verification of all system requirements and features.

A) functional baseline
B) operational baseline
C) allocated baseline
D) product baseline
Question
In maintenance management,_____ means examining the whole in order to learn about the individual elements.

A) synthesis
B) adoption
C) analysis
D) elucidation
Question
A _____ is a security weakness or soft spot.

A) proxy
B) vulnerability
C) firewall
D) malware
Question
A _____ is an internal or external entity that could endanger an asset.

A) proxy
B) facade
C) firewall
D) threat
Question
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?

A) Human error
B) Technical obsolescence
C) Service failure
D) Espionage
Question
Provide three signs indicating a system has reached the end of its economically useful life.
Question
Define network.What is required to connect to a network?
Question
The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.

A) security policy
B) risk policy
C) threat report
D) concealment report
Question
List at least eight different tasks a service desk staff member might have to perform during a typical day.
Question
_____ develops safeguards that reduce risks and their impact.

A) Risk assessment
B) Risk verification
C) Risk identification
D) Risk control
Question
_____ prevents unauthorized users from creating,modifying,or deleting information.

A) Availability
B) Integrity
C) Confidentiality
D) Evacuation
Question
What is capacity planning? Include an explanation of what-if analysis in your answer.
Question
_____ analyzes an organization's assets,threats,and vulnerabilities.

A) Risk uncertainty
B) Risk diversification
C) Risk identification
D) Risk control
Question
_____ protects information from unauthorized disclosure and safeguards privacy.

A) Availability
B) Integrity
C) Confidentiality
D) Accessibility
Question
Explain the importance of technical credentials and certification.
Question
A(n)_____ is an attack that takes advantage of a vulnerability.

A) proxy
B) exploit
C) firewall
D) archive
Question
_____ measures the time between submitting a request for information and the fulfillment of the request.

A) Bandwidth
B) Turnaround time
C) Throughput
D) Frequency
Question
_____ ensures that authorized users have timely and reliable access to necessary information.

A) Availability
B) Integrity
C) Confidentiality
D) Concealability
Question
One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?

A) Vandalism
B) Trespass and espionage
C) Extortion
D) Software attack
Question
_____ is a process that monitors current activity and performance levels,anticipates future activity,and forecasts the resources needed to provide desired levels of service.

A) Restructuring
B) Capacity planning
C) Resource sizing
D) Reorganizing
Question
_____ measures risk likelihood and impact.

A) Risk assessment
B) Risk marking
C) Risk identification
D) Risk control
Question
_____,a risk control strategy,eliminates risks by adding protective safeguards.

A) Avoidance
B) Acceptance
C) Conveyance
D) Transference
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Managing Systems Support and Security
1
In dumpster diving attacks,an intruder raids desks or trash bins for valuable information.
True
2
The main objective of training is to show users how the system can help them perform their jobs.
True
3
Bandwidth requirements are expressed in bytes per minute.
False
4
In a public key encryption environment,each user on the network has a pair of keys: a foreign key and a private key.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Acceptance means that nothing is done;companies usually accept a risk only when the protection clearly is not worth the expense.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
A continuous backup only backs up files that are new or changed since the last full backup.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
A test site is an alternate IT location,anywhere in the world,that can support critical systems in the event of a power outage,system crash,or physical catastrophe.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Retention periods of backups can be a specific number of months or years,depending on legal requirements and company policy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Wrapping refers to the practice of storing backup media away from the main business location,in order to mitigate the risk of a catastrophic disaster,such as a flood,fire,or earthquake.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
As enterprise-wide information systems grow more complex,configuration management becomes trivial.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
In a secluded engineering attack,an intruder uses social interaction to gain access to a computer system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Mitigation shifts the risk to another asset or party,such as an insurance company.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Hard skills include communications,interpersonal,and perceptive abilities.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Maintenance expense stay consistently the same during the system's operational life.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
A system in its final stages requires corrective maintenance only to keep the system operational.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
In a broad sense,credentials include formal degrees,diplomas,or certificates granted by learning institutions to show that a certain level of education has been achieved.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Software leases are not considered an operational cost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Cloud computing provides the IT infrastructure that enables service orientation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
One highly publicized form of social engineering is called post texting,which is a method of obtaining personal information under false pretenses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
The hardening process that makes a system more secure is fully automatic.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
_____ include changing programs,procedures,or documentation to ensure correct system performance;adapting the system to changing requirements;and making the system operate more efficiently.

A) Team building activities
B) Elicitation activities
C) Maintenance activities
D) Testing activities
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
Preventative maintenance adds new capability and enhancements.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Corrective maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Adaptive maintenance involves changing an operational system to make it more efficient,reliable,or maintainable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.

A) Secure
B) Maintenance
C) Principal
D) Capital
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Adaptive maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
A help desk can boost its productivity by using _____,which allows IT staff to take over a user's workstation and provide support and troubleshooting.

A) high-level synthesis
B) wireless fidelity
C) word editing software
D) remote control software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
When a user submits a maintenance request,the system administrator makes an initial determination.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Backup media can include tape,hard drives,optical storage,and online storage.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
When a maintenance release methodology is used,all changes,critical and noncritical,are implemented consecutively as they arrive.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Perfective maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) competes for resources in an operational system
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

A) implementation
B) verification
C) security
D) testing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
Using a release methodology reduces the documentation burden.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
_____ costs include expenses for items such as supplies and equipment rental.

A) Operational
B) Corrective
C) Maintenance
D) Adaptive
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
A _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.

A) help desk
B) white spot
C) maintenance software module
D) utility point
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
A patch is a specially written software module that provides temporary repairs so operations can resume.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
An incremental backup only includes recent files that have never been backed up by any method.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
When network traffic is encrypted,it is invisible and its content and purpose are masked.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
If significant changes take place in an existing system or if a new version is released,the IT department might develop a _____.

A) user training package
B) user presence software
C) maintenance module
D) utility index
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
In a typical system,the initial version of the system is 1.0,and the release that includes the first set of maintenance changes is version _____.

A) 2.1
B) 1.1
C) 0.1
D) 2.1
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
When a new version of a system is installed,the prior release is _____,or stored.

A) archived
B) deleted
C) discontinued
D) reinstalled
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
To measure system performance,companies use _____,which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.

A) metric analysis
B) benchmark testing
C) threat analysis
D) allocation testing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
In maintenance management,_____ involves studying the parts of a system to understand the overall system.

A) synthesis
B) adoption
C) fusion
D) elucidation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
In addition to benchmark testing,performance measurements,called _____,can monitor the number of transactions processed in a given time period,the number of records accessed,and the volume of online data.

A) metrics
B) wireframes
C) viewports
D) baselines
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Many IT departments use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.

A) tester/programmer
B) strategist/analyst
C) programmer/analyst
D) designer/debugger
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.

A) Throughput
B) Resolution
C) Dimensionality
D) Latency
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.

A) functional baseline
B) operational baseline
C) allocated baseline
D) product baseline
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Perfective maintenance usually is cost effective _____ a system's operational life.

A) early in
B) during the middle of
C) during the end of
D) throughout
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
_____ is the overall time between a request for system activity and the delivery of the response.

A) Response time
B) Throughput time
C) Refresh rate
D) Base rate
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
_____ describes the amount of data that a system can transfer in a fixed time period.

A) Latency
B) Resolution
C) Dimensionality
D) Bandwidth
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
_____ includes monitoring a system for signs of trouble,logging all system failures,diagnosing the problem,and applying corrective action.

A) Benchmark testing
B) Throughput management
C) Responsive testing
D) Fault management
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
A _____ is a formal reference point that measures system characteristics at a specific time.

A) feature line
B) baseline
C) product point
D) viewport
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
_____ is the process of tracking system releases.

A) Configuration control
B) Version control
C) Source control
D) Quality control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.

A) tester
B) programmer
C) system validator
D) system administrator
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
_____ is a process for controlling changes in system requirements during software development.

A) Data management
B) Disk management
C) Configuration management
D) Email management
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
To avoid problems,preventive maintenance _____.

A) adds enhancements to an operational system and makes the system easier to use
B) diagnoses and corrects errors in an operational system
C) involves changing an operational system to make it more efficient,reliable,or maintainable
D) requires analysis of areas where trouble is likely to occur
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

A) functional baseline
B) extension baseline
C) allocated baseline
D) product baseline
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
The _____ documents a system at the end of the design phase,identifies any changes since the beginning of the project,and includes testing and verification of all system requirements and features.

A) functional baseline
B) operational baseline
C) allocated baseline
D) product baseline
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
In maintenance management,_____ means examining the whole in order to learn about the individual elements.

A) synthesis
B) adoption
C) analysis
D) elucidation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
A _____ is a security weakness or soft spot.

A) proxy
B) vulnerability
C) firewall
D) malware
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
A _____ is an internal or external entity that could endanger an asset.

A) proxy
B) facade
C) firewall
D) threat
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack.How does George categorize this threat?

A) Human error
B) Technical obsolescence
C) Service failure
D) Espionage
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Provide three signs indicating a system has reached the end of its economically useful life.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Define network.What is required to connect to a network?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
The first step in managing IT security is to develop a _____ based on confidentiality,integrity,and availability.

A) security policy
B) risk policy
C) threat report
D) concealment report
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
List at least eight different tasks a service desk staff member might have to perform during a typical day.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
_____ develops safeguards that reduce risks and their impact.

A) Risk assessment
B) Risk verification
C) Risk identification
D) Risk control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
_____ prevents unauthorized users from creating,modifying,or deleting information.

A) Availability
B) Integrity
C) Confidentiality
D) Evacuation
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
What is capacity planning? Include an explanation of what-if analysis in your answer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
_____ analyzes an organization's assets,threats,and vulnerabilities.

A) Risk uncertainty
B) Risk diversification
C) Risk identification
D) Risk control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
_____ protects information from unauthorized disclosure and safeguards privacy.

A) Availability
B) Integrity
C) Confidentiality
D) Accessibility
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Explain the importance of technical credentials and certification.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
A(n)_____ is an attack that takes advantage of a vulnerability.

A) proxy
B) exploit
C) firewall
D) archive
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
_____ measures the time between submitting a request for information and the fulfillment of the request.

A) Bandwidth
B) Turnaround time
C) Throughput
D) Frequency
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
_____ ensures that authorized users have timely and reliable access to necessary information.

A) Availability
B) Integrity
C) Confidentiality
D) Concealability
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid.In which of the following categories should George place this incident?

A) Vandalism
B) Trespass and espionage
C) Extortion
D) Software attack
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
_____ is a process that monitors current activity and performance levels,anticipates future activity,and forecasts the resources needed to provide desired levels of service.

A) Restructuring
B) Capacity planning
C) Resource sizing
D) Reorganizing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
_____ measures risk likelihood and impact.

A) Risk assessment
B) Risk marking
C) Risk identification
D) Risk control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
_____,a risk control strategy,eliminates risks by adding protective safeguards.

A) Avoidance
B) Acceptance
C) Conveyance
D) Transference
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.