Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
BIA is performed to identify
|
The exposures to loss fo the organization
|
|
Which phrase best defines a BC/DRP?
|
The adequate preparations and procedures for the continuation of all business functions
|
|
the use of groups is an example of
|
Abstraction
|
|
type of backup for the most efficient restore from tape back-up:
|
Full backup
|
|
TYPE of IDS to use against polymorphic worms
|
Pattern matching
|
|
WHich of the following is not a concern when configuring audit logs within a system?
|
number of ppl w/ access to that asset
|
|
The reason to implement additional controls or safeguards is to
|
reduce the impact of the threat
|
|
privileges needed for intermittent job functions should
|
be performed using an account specifically allocated for such a tasks as opposed to normal system and user activity
|
|
two methods of encrypting data
|
asym and symmetric
|
|
prior to installing video surveillance, what must be done
|
policy created and distributed
|
|
What are effect protective or countermeasures against DDOS
|
Random network layout, reserved bandwidth and traffic filtering
|
|
ensures lack of data leakage
|
proccess isolation
|
|
tactical security plans
|
deploy new security techonoolgoy
|
|
site for MTD 3hrs
|
Hot site
|
|
totality of protection mechanism within a computer system
|
TCB
|
|
property that ensure only valid or legal transaction that do not violate any user-defined integrity contstraindin DBMS technolgos is known as
|
Consistency
|