Question
click below
click below
Question
Normal Size Small Size show me how
IS Final
Ch. 12
Question | Answer |
---|---|
Develops safeguards that reduce risks and their impact | Risk Control |
When a new version of a system is installed, the prior release is _____, or stored. | Archived |
As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by | Corrective Maintenance |
In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited | Risk |
A _____ is the main line of defense between a local network, or intranet, and the Internet. | Firewall |
Prevents unauthorized users from creating, modifying, or deleting information. | Integrity |
Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster, such as a flood, fire, or earthquake. | False |
The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life. | Security |
Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy. | True |
In maintenance management, _____ means examining the whole in order to learn about the individual elements. | Analysis |
In dumpster diving attacks, an intruder raids desks or trash bins for valuable information. | True |
A help desk can boost its productivity by using _____, which allows IT staff to take over a user’s workstation and provide support and troubleshooting. | Remote Control Software |
Include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. | Maintenaince Activities |
Is a process for controlling changes in system requirements during software development. | Configuration Management |
A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs. | Help Desk |
A(n) _____ is an attack that takes advantage of a vulnerability. | Exploit |
Is the overall time between a request for system activity and the delivery of the response. | Response Time |
Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident? | Social Engineering |
A _____ is a formal reference point that measures system characteristics at a specific time. | Baseline |
Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels | Privilege Escalation Attack |