Free Essay

Cis 359 Midterm Exam Week 5

In:

Submitted By davidbowie
Words 1076
Pages 5
CIS 359 Midterm Exam Week 5

Buy Now From Below:

http://www.homeworkarena.com/cis-359-week-5

A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset. The term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect. ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation. Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states. ____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organization. A(n) ____ is any clearly identified attack on the organization’s information assets that would threaten the assets’ confidentiality, integrity, or availability. ____ is the process of examining, documenting, and assessing the security posture of an organization’s information technology and the risks it faces. A ____ attack seeks to deny legitimate users access to services by either tying up a server’s available resources or causing it to shut down An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy. A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client. A ____ is a synonym for a virtualization application. A ____ is an agency that provides physical facilities in the event of a disaster for a fee. A ____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor. A(n) ____ backup only archives the files that have been modified since the last backup. Considered to be the traditional “lock and copy” approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive. RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array. ____ uses a number of hard drives to store information across multiple drive units.
Answer

The ____ job functions and organizational roles focus on costs of system creation and operation, ease of use for system users, timeliness of system creation, and transaction response time. To a large extent, incident response capabilities are part of a normal IT budget. The only area in which additional budgeting is absolutely required for incident response is the maintenance of ____. The ____ is used to collect information directly from the end users and business managers. What is a common approach used in the discipline of systems analysis and design to understand the ways systems operate and to chart process flows and interdependency studies? The final component to the CPMT planning process is to deal with ____. Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware? The ____ is the point in time by which systems and data must be recovered after an outage as determined by the business unit. Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business functions is a(n) ____.: The training delivery method with the lowest cost to the organization is ____. Incident analysis resources include network diagrams and lists of ____, such as database servers. One of the primary responsibilities of the IRP team is to ensure that the ____ is prepared to respond to each incident it may face. The U.S. National Institute of Standards and Technology recommends a set of tools for the CSIRT including incident reporting mechanisms with which users can report suspected incidents. At least one of these mechanisms should permit people to report incidents ____. A(n) ____ is a CSIRT team member, other than the team leader, who is currently performing the responsibilities of the team leader in scanning the organization’s information infrastructure for signs of an incident. Should an incident begin to escalate, the CSIRT team leader continues to add resources and skill sets as necessary to attempt to contain and terminate the incident. The resulting team is called the ____ for this particular incident. The responsibility for creating an organization’s IR plan often falls to the ____. A(n) ____ is a detailed examination of the events that occurred, from first detection of an incident to final recovery. A(n) ____ is any system resource that is placed onto a functional system but has no normal use for that system. If it attracts attention, it is from unauthorized access and will trigger a notification or response. Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be under way. ____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software program called ____ running on an open source UNIX or Linux system that can be managed and queried from a desktop computer using a client interface. When the measured activity is outside the baseline parameters in a behavior-based IDPS, it is said to exceed the ____ (the level at which the IDPS triggers an alert to notify the administrator). The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications. A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the log files generated by servers, network devices, and even other IDPSs.

Similar Documents

Premium Essay

Business

...C h a p t e r 1 Prewriting GETTING STARTED (OR SOUP-CAN LABELS CAN BE FASCINATING) For many writers, getting started is the hardest part. You may have noticed that when it is time to begin a writing assignment, you suddenly develop an enormous desire to straighten your books, water your plants, or sharpen your pencils for the fifth time. If this situation sounds familiar, you may find it reassuring to know that many professionals undergo these same strange compulsions before they begin writing. Jean Kerr, author of Please Don’t Eat the Daisies, admits that she often finds herself in the kitchen reading soup-can labels—or anything—in order to prolong the moments before taking pen in hand. John C. Calhoun, vice president under Andrew Jackson, insisted he had to plow his fields before he could write, and Joseph Conrad, author of Lord Jim and other novels, is said to have cried on occasion from the sheer dread of sitting down to compose his stories. To spare you as much hand-wringing as possible, this chapter presents some practical suggestions on how to begin writing your short essay. Although all writers must find the methods that work best for them, you may find some of the following ideas helpful. But no matter how you actually begin putting words on paper, it is absolutely essential to maintain two basic ideas concerning your writing task. Before you write a single sentence, you should always remind yourself that 1. You have some valuable ideas to tell your reader,...

Words: 234754 - Pages: 940

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Premium Essay

Probability

...Probability & Statistics for Engineers & Scientists This page intentionally left blank Probability & Statistics for Engineers & Scientists NINTH EDITION Ronald E. Walpole Roanoke College Raymond H. Myers Virginia Tech Sharon L. Myers Radford University Keying Ye University of Texas at San Antonio Prentice Hall Editor in Chief: Deirdre Lynch Acquisitions Editor: Christopher Cummings Executive Content Editor: Christine O’Brien Associate Editor: Christina Lepre Senior Managing Editor: Karen Wernholm Senior Production Project Manager: Tracy Patruno Design Manager: Andrea Nix Cover Designer: Heather Scott Digital Assets Manager: Marianne Groth Associate Media Producer: Vicki Dreyfus Marketing Manager: Alex Gay Marketing Assistant: Kathleen DeChavez Senior Author Support/Technology Specialist: Joe Vetere Rights and Permissions Advisor: Michael Joyce Senior Manufacturing Buyer: Carol Melville Production Coordination: Lifland et al. Bookmakers Composition: Keying Ye Cover photo: Marjory Dressler/Dressler Photo-Graphics Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and Pearson was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Probability & statistics for engineers & scientists/Ronald E. Walpole . . . [et al.] — 9th ed. p. cm. ISBN 978-0-321-62911-1...

Words: 201669 - Pages: 807

Premium Essay

世界是平的

...The World is Flat Thomas L Friedman Kq p K To Matt and Kay and to Ron Kq p K Contents How the World Became Flat One: While I Was Sleeping / 3 Two: The Ten Forces That Flattened the World / 48 Flattener#l. 11/9/89 Flattener #2. 8/9/95 Flattener #3. Work Flow Software Flattener #4. Open-Sourcing Flattener #5. Outsourcing Flattener #6. Offshoring Flattener #7. Supply-Chaining Flattener #8. Insourcing Flattener #9. In-forming Flattener #10. The Steroids Three: The Triple Convergence / 173 Four: The Great Sorting Out / 201 America and the Flat World Five: America and Free Trade / 225 Six: The Untouchables / 237 Seven: The Quiet Crisis / 250 Eight: This Is Not a Test / 276 Developing Countries and the Flat World Nine: The Virgin of Guadalupe / 309 Companies and the Flat World Geopolitics and the Flat World Eleven: The Unflat World / 371 Twelve: The Dell Theory of Conflict Prevention / 414 Conclusion: Imagination Thirteen: 11/9 Versus 9/11 / 441 Acknowledgments I 471 Index I 475 Kq p K :::::How the World Became Flat ::::: ONE While I Was Sleeping Your Highnesses, as Catholic Christians, and princes who love and promote the holy Christian faith, and are enemies of the doctrine of Mahomet, and of all idolatry and heresy, determined to send me, Christopher Columbus, to the above-mentioned countries of India, to see the said princes, people, and territories, and to learn their disposition and the proper method of converting them to our...

Words: 170179 - Pages: 681