• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
BIA is performed to identify
The exposures to loss fo the organization
Which phrase best defines a BC/DRP?
The adequate preparations and procedures for the continuation of all business functions
the use of groups is an example of
Abstraction
type of backup for the most efficient restore from tape back-up:
Full backup
TYPE of IDS to use against polymorphic worms
Pattern matching
WHich of the following is not a concern when configuring audit logs within a system?
number of ppl w/ access to that asset
The reason to implement additional controls or safeguards is to
reduce the impact of the threat
privileges needed for intermittent job functions should
be performed using an account specifically allocated for such a tasks as opposed to normal system and user activity
two methods of encrypting data
asym and symmetric
prior to installing video surveillance, what must be done
policy created and distributed
What are effect protective or countermeasures against DDOS
Random network layout, reserved bandwidth and traffic filtering
ensures lack of data leakage
proccess isolation
tactical security plans
deploy new security techonoolgoy
site for MTD 3hrs
Hot site
totality of protection mechanism within a computer system
TCB
property that ensure only valid or legal transaction that do not violate any user-defined integrity contstraindin DBMS technolgos is known as
Consistency