Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (20)
Security administration is the group of individuals responsible for the planning, design, implementation, and monitoring of an organization's security plan.
The security program requires documentation of:
ALL OF THE ABOVE
-The security process
- The policies, procedures, and guidelines adopted by the organization.
-The authority of the persons responsible for security
Which software testing method provides random input to see how software handles unexpected data?
In 1989, the IAB issued a statement of policy about Internet ethics. This document is known as ________.
________ involve the standardization of the hardware and software solutions used to address a security risk throughout the organization.
When you use a control that costs more than the risk involved, you're making a poor management decision.
Which of the following is an example of a level of permissiveness?
All of the above
An audit examines whether security controls are appropriate, installed correctly, and __________.
Addressing their purpose
A __________ is a standard used to measure how effective your system is as it relates to industry expectations.
In __________ methods, the IDS compares current traffic with activity patterns consistent with those of a known network intrusion via pattern matching and stateful matching.
A plan that contains the actions needed to keep critical business processes running after a disruption is called a __________.
Business continuity plan (BCP)
A plan that details the steps to recover from a major disruption and restore the infrastructure necessary for normal business operations is a __________.
Disaster recovery plan (DRP)
A vulnerability is any exposure that could allow a threat to be realized.
Any event that either violates or threatens to violate your security policy is known as a(n) __________.
Risk that remains even after risk mitigation efforts have been implemented is known as __________ risk.
Which type of malware attaches to, or infects, other programs?
Which type of malicious software is a standalone program that propagates from one computer to another?
In the malware context, which of the following best defines the term mobile code?
Website active content
A(n) __________ is a network of compromised computers that attackers use to launch attacks and spread malware.
What does the TCP SYN flood attack do to cause a DDoS?
Fills up the pending connections table
Other sets by this creator
Executive branch (president)
Supreme Court Cases 2
Supreme Court Cases
Other Quizlet sets
Midterm Quizzes 1-6
Week 2: Forecasting
econ 222 ch. 5