Ch. 12
Help!
|
|
||||
|---|---|---|---|---|---|
| Develops safeguards that reduce risks and their impact | Risk Control
🗑
|
||||
| When a new version of a system is installed, the prior release is _____, or stored. | Archived
🗑
|
||||
| As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by | Corrective Maintenance
🗑
|
||||
| In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited | Risk
🗑
|
||||
| A _____ is the main line of defense between a local network, or intranet, and the Internet. | Firewall
🗑
|
||||
| Prevents unauthorized users from creating, modifying, or deleting information. | Integrity
🗑
|
||||
| Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster, such as a flood, fire, or earthquake. | False
🗑
|
||||
| The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life. | Security
🗑
|
||||
| Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy. | True
🗑
|
||||
| In maintenance management, _____ means examining the whole in order to learn about the individual elements. | Analysis
🗑
|
||||
| In dumpster diving attacks, an intruder raids desks or trash bins for valuable information. | True
🗑
|
||||
| A help desk can boost its productivity by using _____, which allows IT staff to take over a user’s workstation and provide support and troubleshooting. | Remote Control Software
🗑
|
||||
| Include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. | Maintenaince Activities
🗑
|
||||
| Is a process for controlling changes in system requirements during software development. | Configuration Management
🗑
|
||||
| A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs. | Help Desk
🗑
|
||||
| A(n) _____ is an attack that takes advantage of a vulnerability. | Exploit
🗑
|
||||
| Is the overall time between a request for system activity and the delivery of the response. | Response Time
🗑
|
||||
| Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident? | Social Engineering
🗑
|
||||
| A _____ is a formal reference point that measures system characteristics at a specific time. | Baseline
🗑
|
||||
| Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels | Privilege Escalation Attack
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
dvasque2