8.4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Howard is a security analyst working with an experienced computer forensics investigator. The investigator asks him to retrieve a forensic drive controller, but Howard cannot locate a device in the storage room with this name.
What is another name for a forensic drive controller?

Write blocker

2
New cards

Jasper Diamonds is a jewelry manufacturer that markets and sells custom jewelry through its website. Bethany is the manager of Jasper's software development organization, and she is working to bring the company into line with industry-standard practices. She is developing a new change management process for the organization and wants to follow commonly accepted approaches.
Bethany would like to put in place controls that provide an organized framework for company employees to suggest new website features that her team will develop.
What change management process facilitates this?

Request control

3
New cards

Jasper Diamonds is a jewelry manufacturer that markets and sells custom jewelry through its website. Bethany is the manager of Jasper's software development organization, and she is working to bring the company into line with industry-standard practices. She is developing a new change management process for the organization and wants to follow commonly accepted approaches.
Bethany would also like to create a process that helps multiple developers work on code at the same time.
What change management process facilitates this?

Change control

4
New cards

Jasper Diamonds is a jewelry manufacturer that markets and sells custom jewelry through its website. Bethany is the manager of Jasper's software development organization, and she is working to bring the company into line with industry-standard practices. She is developing a new change management process for the organization and wants to follow commonly accepted approaches.
Bethany is working with her colleagues to conduct user acceptance testing.
What change management process includes this task?

Release control

5
New cards

Jasper Diamonds is a jewelry manufacturer that markets and sells custom jewelry through its website. Bethany is the manager of Jasper's software development organization, and she is working to bring the company into line with industry-standard practices. She is developing a new change management process for the organization and wants to follow commonly accepted approaches.
Bethany noticed that some problems arise when system administrators update libraries without informing developers.
What change management process can assist with this problem?

Configuration control

6
New cards

Place the list of disaster recovery test types in order of their potential impact on the business, starting with the least impactful and progressing through the most impactful.

  1. Checklist review

  2. Parallel test

  3. Tabletop exercise

  4. Full interruption test

1, 3, 2, 4

7
New cards

What step is missing from the IR process cycle diagram shown here?

Recovery

8
New cards

Megan wants to ensure that the new software as a service provider that her company is signing a contract with will make sure the service works all the time without disruptions.
Which of the following is often part of contracts to provide that assurance?

SLA

9
New cards

Norm would like to conduct a disaster recovery test for his organization and wants to choose the most thorough type of test, recognizing that it may be quite disruptive.
What type of test should Norm choose?

Full interruption test

10
New cards

Tammy is selecting a disaster recovery facility for her organization. She would like to choose a facility that balances the time required to recover operations with the cost involved.
What type of facility should she choose?

Warm site

11
New cards

Some adversaries use DoS attacks as their primary weapon to harm targets, whereas others may use them as weapons of last resort when all other attempts to intrude on a target fail.
Which of the following is most likely to detect DoS attacks?

Network-based IDS

12
New cards

Unfortunately, attackers have many options of attacks to perform against their targets.
Which of the following is considered a denial-of-service (DoS) attack?

While surfing the web, sending to a web server a malformed URL that causes the system to consume 100 percent of the CPU

13
New cards

Which type of firewall automatically adjusts its filtering rules based on the content and context of the traffic of existing sessions?

Stateful inspection

14
New cards

Collusion is when two or more people work together to commit a crime or violate a company policy.
Which of the following is not a defense against collusion?

Group user accounts

15
New cards

Any evidence to be used in a court proceeding must abide by the Rules of Evidence to be admissible.
What type of evidence refers to written documents that are brought into court to prove a fact?

Documentary