CISSP - Practice
Data Remanence ANSWER: The remains of partial or even the entire data set of digital information
Disaster Recovery Planning (DRP)
... [Show More] ANSWER: Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal
Maximum tolerable downtime ANSWER: The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage.
802.5 ANSWER: IEEE standard defines the Token Ring media access method
Recovery Time Objective ANSWER: The balance against the cost of recover and the cost of disruption
Resource Requirements ANSWER: portion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function.
Checklist ANSWER: Test is one in which copies of the plan are handed out to each functional area to ensure the plan deal with their needs
Information Owner ANSWER: The one person responsible for data, its classification and control setting
Job Rotation ANSWER: To move from location to location, keeping the same function
Differential power analysis ANSWER: A side-channel attack carry-out on smart cards that examining the power emission release during processing
Mitigate ANSWER: Defined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in
progress.
Electromagnetic analysis ANSWER: A side-channel attack on smart cards that examine the frequencies emitted and timing
Analysis ANSWER: Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Change Control ANSWER: Maintaining full control over requests, implementation, traceability, and proper documentation of changes.
Containment ANSWER: Mitigate damage by isolating compromised systems from the network.
30 to 90 Days ANSWER: Most organizations enforce policies to change password ranging from
Isochronous ANSWER: Process must within set time constrains, applications are video related where audio and video must match perfectly
Detection ANSWER: Identification and notification of an unauthorized and/or undesired action [Show Less]