1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
How to troubleshoot
(5.1)
Uh oh… It’s broken!
Identify the problem
Establish a theory… Sometimes the simplest problem is the problem.
Test the theory.
(5.2)
Troubleshooting Common Hardware Problems
(5.3)
3rd party risk
3rd party business partners share important data
- Perform risk assessment
(5.3)
(5.3)
Rules of engagement
Defines purpose and scope of pen test
Rules of test
- ip address ranges
- in/out of scope apps and devices
etc
Time, internal/external, etc.
(5.3)
(5.3)
Vendor selection process
Due diligence
- check vendors to make sure they are legit
Conflict of interest
- can compromise judgement
(5.3)
(5.3)
Ongoing management of vendor relationship
Reviews should be on regular basis
- Financial, IT security, etc.
(5.3)
(5.3)
Right to audit clauses
Legal agreement to have the option to perform security audits at any time
- in contracts with 3rd parties
- verify security