Chapter 11 Reading (half butted)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:44 AM on 4/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

The Trust Service Framework organizes IT-related controls into 5 principles, what are they

Security

Confidentiality

Privacy

Processing Integrity

Availability

2
New cards

What are the 4 steps in the security life cycle?

  1. Assess threats and select risk response

  2. Develop and communicate policy

  3. Acquire and implement solutions

  4. Monitor Performance

3
New cards

time based model of information security formula?

p > D + R

p= time it takes hacker to get in

D= time it takes for organization to detect attack

R= time it takes to respond and stop attack

If formula is satisfied then security procedures are effective

4
New cards

The Trust Services Framework identifies five principles for systems reliability. Which one of those five principles is a necessary prerequisite to the other​ four? (Reading question)

security

5
New cards

The Trust Services Principle​ "Confidentiality" focuses on? (Reading question)

protection of sensitive corporate data from unauthorized disclosure.

6
New cards

Authentication definition

process of verifying the identity of the person or device attempting to access the system

7
New cards

3 types of credentials for authentication

Something someone knows (password or pin)

Something someone has (smart card or id badge)

Some physical characteristic (fingerprint or typing pattern?)

8
New cards

Using 2 or more authentication methods at same time

multifactor authentication

Better than multimodal since credentials are independent of each other

9
New cards

Using 2 or more authentication methods of the same type at same time

multimodal authentication

10
New cards

authorization

process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform (goal is to maintain adequate segregation of duties)

11
New cards

When an authenticated employee attempts to access a particular information system resource, the system performs a

compatibility test, which compares the users credentials against the control matrix (to see if they have access)

12
New cards

what device connects an organizations information system to the internet

border router

13
New cards

the demilitarized zone is

a separate network located outside of the organization i.s. to permit access from the internet to selected resources

14
New cards

If the time an attacker takes to break through the​ organization's preventive controls is shorter than the sum of the time required for the organization to detect the attack and the time required to respond to the​ attack, then​ organization's security is considered (Reading question)

ineffective.

15
New cards

Which of the following is not an example of​ multi-factor authentication? (Reading question)

A passphrase and a security question - multimodal

16
New cards

Which device blocks or admits individual packets by examining information in the TCP and IP​ headers? (Reading question)

Firewall

17
New cards

Which step should happen first as part of the incident response​ process? (Reading question)

Recognition of an attack

18
New cards

Which of the following is the correct sequence of steps in the incident response​ process? (Reading question)

Recognize that a problem​ exists, stop the​ attack, repair the​ damage, learn from the attack

19
New cards

Change management and change control processes need to be applied to any modifications​ to: (Reading question)

  • hardware.

  • operating procedures.

  • software.

20
New cards

Which of the following are indicators that an​ organization's change management and change control process is​ effective? (Reading question)


  1. Testing of all changes takes place in a system separate from the one used for regular business operations

  2. A reduction in the number of problems that need to be fixed

  3. A low number of emergency changes

21
New cards

Which of the following​ is(are) true? (Reading question)

  1. Multifactor authentication is necessary for controlling access to virtualized systems.

  2. The Cloud and virtualization increase the risk associated with unsupervised physical access.

  3. Network access controls​ (e.g., firewalls, intrusion prevention systems​ (IPS), and intrusion detection systems​ (IDS)) should be employed both in the cloud and in virtualized systems.

22
New cards
23
New cards
24
New cards