Chapter 03 Quiz (ITN260) - Operational and Organizational Security

studied byStudied by 16 people
5.0(2)
Get a hint
Hint

Who is responsible for the determination of policies for a given system?

1 / 29

flashcard set

Earn XP

Description and Tags

30 Terms

1

Who is responsible for the determination of policies for a given system?

System owner

New cards
2

What five phases should be covered in an incident response policy?

Preparation, detection, containment and eradication, recovery, and follow-up actions

New cards
3

Generally, policies should be updated more frequently than the procedures that implement them. (T/F)

False

New cards
4

Which term refers to the step between the account having access and the account being removed from the system?

Account disablement

New cards
5

Guidelines are mandatory elements regarding the implementation of a policy. (T/F)

False

New cards
6

Which term describes a method to check the security of a system by simulating an attack by a malicious individual?

Penetration test

New cards
7

Which term generally refers to the standard of care a reasonable person is expected to exercise in all situations?

Due care

New cards
8

Which term generally refers to the standard of care a business is expected to exercise in preparation for a business transaction?

Due diligence

New cards
9

Which user type has virtually unlimited power over the system?

system administrator

New cards
10

Which term describes a legal document used to describe a bilateral agreement between parties regarding a set of intended actions between the parties with respect to some common pursuit or goal?

memorandum of understanding (MOU)

New cards
11

Which type of classification includes categories such as High, Medium, Low, Confidential, Private, and Public?

information classification

New cards
12

Which term describes a legal agreement between partners establishing the terms, conditions, and expectations of the relationship between the partners?

business partnership agreement (BPA)

New cards
13

Which term refers to ensuring each individual in the organization is supplied with only the absolute minimum amount of information and privileges they need to perform their work tasks?

need to know

New cards
14

Data requires a data owner. (T/F)

True

New cards
15

Which password best meets typical complexity requirements?

p@ssw0rD

New cards
16

Disabling an account is irreversible. (T/F)

False

New cards
17

Which term is used for people who have data responsibilities?

data owners

New cards
18

Which document lays out a uniform set of rules associated with partnerships to resolve any partnership terms?

Uniform Partnership Act (UPA)

New cards
19

What are the four steps that make up the policy lifecycle?

plan, implement, monitor, and evaluate

New cards
20

Which term describes a high-level statement produced by senior management that outlines both what security means to the organization and the organization's goals for security?

security policy

New cards
21

Maintaining proper information in security training records is a requirement of several laws and regulations. (T/F)

True

New cards
22

Which term refers to a contractual agreement detailing the expectations of the customer and the service provider?

service level agreement (SLA)

New cards
23

Which term is concerned with guaranteeing fundamental fairness, justice, and liberty in relation to an individual's legal rights?

due process

New cards
24

What step can be taken to evaluate the effectiveness of the security measures in place at an organization?

Perform a vulnerability assessment.

New cards
25

Password length is critical to password-based security. (T/F)

True

New cards
26

The purpose of change management is to ensure proper procedures are followed when modifications to the IT infrastructure are made. (T/F)

True

New cards
27

What is one leading cause of account hijacking?

improper use and/or control over passwords

New cards
28

Which term refers to a security principle employed in many organizations to ensure that no single individual has the ability to conduct transactions alone?

separation of duties

New cards
29

Before magnetic storage media (such as disks or tapes) is discarded in the trash or sold for salvage, it should have all files deleted and should be overwritten at least ________ times with all 1's, all 0's, and then random characters.

three

New cards
30

Nondisclosure agreements (NDAs) are frequently used to delineate the level and type of company secret information, and with whom it can be shared. (T/F)

True

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 89 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 87 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard25 terms
studied byStudied by 59 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard91 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard100 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard43 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard92 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard253 terms
studied byStudied by 57 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard83 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard149 terms
studied byStudied by 61 people
Updated ... ago
5.0 Stars(2)