Quiz

A mail server that has a vulnerability which involves a hardware failure with a likelihood of 0.4. The mail server has an impact rating of 80. One control has been implemented that reduces the impact of the vulnerability by 50%. Assumptions made on this asset have an 70% certainty.
25.6
24.6
23.6
26.6
____ is the percentage of value an asset lost due to an incident.
Single loss expectancy
Exposure factor
Annualized rate of occurrance
Annualized loss expectancy
____ policies are more specific to the operation of a system than ACLs, and they may or may not deal with users directly.
Rule
ACL
Temp
Session
Risk __ is the application of controls to reduce the risks to an organization’s data and information systems.
Management
Control
Identification
Security
__ equals likelihood of vulnerability occurrence times value (or impact) minus percentage risk already controlled plus an element of uncertainty.
Probability
Risk
Possibility
Chance
Person or element that has the power to carry out a threat
Threat Agent
Threat
Risk
Vulnerability
The formal decision making process used when considering the economic feasibility of implementing information security controls and safeguards is called a __.
ARO
CBA
ALE
SLE
The actions an organization can and perhaps should take while an incident is in progress should be specified in a document called the __ plan.
BC
DR
IR
BR
__ is simply how often you expect a specific type of attack to occur.
ARO
CBA
ALE
SLE
There are individuals who search trash and recycling — a practice known as __ — to retrieve information that could embarrass a company or compromise information security.
Side view
Dumpster diving
Recycle diving
Garbage collection
The __ strategy attempts to shift risk to other assets, other processes, or other organizations.
Transfer control
Defend control
Accept control
Mitigate control
__ policies address the particular use of certain systems.
Systems-specific
General
Network-specific
Platform-specific
In a __, each information asset is assigned a score for each of a set of assigned critical factor.
OPSEC
COMSEC
Weighted factor analysis
Data classification scheme
Risk __ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
Benefit
Appetite
Acceptance
Avoidance
In the U.S. Military classification scheme, __ data is any information or material the unauthorized disclosure of which reasonably could be expected to cause damage to the national security.
Confidential
Secret
Top secret
Sensitive
__ plans usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the floodwaters recede.
IR
DR
BC
BR
Many corporations use a __ to help secure the confidentiality and integrity of information.
System classification scheme
Data restoration scheme
Data hierarchy
Data classification scheme
The __ strategy attempts to prevent the exploitation of the vulnerability.
Suspend control
Defend control
Defined control
Transfer control
The __ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.
Avoidance of risk
Transference
Mitigation
Accept control
__ is any technology that aids in gathering information about a person or organization without their knowledge.
Spyware
Bot
Worm
Trojan
Acts of __ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
Bypass
Nature
Trespass
Security
A __ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
Distributed denial of Service
Denial of service
Virus
Spam
One form of online vandalism is __ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
Phvist
Hacktivist
Hackcyber
Cyberhack
In the well-known __ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
Zombie-in-the-middle
Sniff-in-the-middle
Server-in-the-middle
Man-in-the-middle
__ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
Drones
Helpers
Servants
Zombies
In a __ attack, the attacker sends a large number of connection or information requests to a target.
Distributed denial-of-service
Denial-of-service
Virus
Spam
__ are software programs that hide their true nature, and reveal their designed behavior only when activated.
Trojan Horses
Viruses
Worms
Spam
The __ is a methodology for the design and implementation of an information system in an organization.
DSLC
SDLC
LCSD
CLSD
A computer is the __ of an attack when it is used to conduct the attack.
Facilitator
Subject
Object
Target
The __ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
ISO
CIO
CISO
CTO
The first phase in the development of the contingency planning process is the __.
BIA
BRP
DP9
IRP
__-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
Firewall
Host
Network
Domain
A buffer against outside attacks is frequently referred to as a __.
Proxy server
No-man’s land
DMZ
Firewall
The __ is based on and directly supports the mission, vision, and direction of the organization and sets the strategic direction, scope, and tone for all security efforts.
ISP
EISP
GSP
ISSP
A __ site provides only rudimentary services and facilities.
Cool
Warm
Hot
Cold
A(n) __ plan deals with the identification, classification, response, and recovery from an incident.
CM
BC
DR
IR
__ often function as standards or procedures to be used when configuring or maintaining systems.
ESSPs
EISPs
ISSPs
SysSPs
 
 
{"name":"Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A mail server that has a vulnerability which involves a hardware failure with a likelihood of 0.4. The mail server has an impact rating of 80. One control has been implemented that reduces the impact of the vulnerability by 50%. Assumptions made on this asset have an 70% certainty., ____ is the percentage of value an asset lost due to an incident., ____ policies are more specific to the operation of a system than ACLs, and they may or may not deal with users directly.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker