Shared Flashcard Set

Details

CISSP: Operations Security
CISSP
46
Computer Science
Professional
09/08/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What is the central theme of effective Operations Security?
Definition
Trust but Verify
Term
__________ is a backup that creates a byte-by-byte copy
Definition
File Image
Term
___________ copies the entire hard disk including the operating system and installed applications.
Definition
System Image
Term
__________ is the replication of data to separate disks in real time.
Definition
Data Mirroring
Term
__________ is the bulk transfer of backup data over communications facilities.
Definition
Electronic Vaulting
Term
___________ delivers real-time database data by capturing and transmitting the journal and transaction log offsite as they are created.
Definition
Remote Journaling
Term
_____________ reduces recovery time by using a database restore and roll-forward process.
Definition
Database Shadowing
Term
____________ keep idle servers available for failover.
Definition
Redundant Servers
Term
______________ provide recovery of most critical applications in a matter of minutes through guaranteed access to an alternate processor.
Definition
Standby Services
Term
What are the three backup storage location options?
Definition
Onsite, offsite, and near-site
Term
A __________ is a pre-installed drive that can immediately replace a failed drive.
Definition
Hot spare
Term
A _______________ is a backup for any disk in the array that fails.
Definition
Global Hot Spare
Term
A __________ is a backup for a specific disk in the array.
Definition
Dedicated Hot Spare
Term
__________ stores data across several disks allowing for a faster read and write speed.
Definition
Striping
Term
Which RAID level consists of Striping only?
Definition
0
Term
Which RAID Level employs mirrored disks?
Definition
1
Term
Which RAID level uses one drive for parity and features byte level parity?
Definition
3
Term
Which RAID level uses one drive for parity and features block level parity?
Definition
4
Term
Which RAID level employs block level stripes and parity interleaved across all drives and is the most popular RAID implementation?
Definition
5
Term
The main difference between RAID 5 and 6 is fault tolerance. Which is more tolerant?
Definition
6
Term
_____________ mandates that changes must be approved, documented, and made via an authorized process.
Definition
Change Control Policy
Term
___________ is the methodical application of vendor-related updates and security enhancements.
Definition
Patch Management
Term
__________ ensures that all team members are using compatible products and ones that have the latest security updates applied.
Definition
Version Control
Term
What are the three types of trusted recovery?
Definition
System Reboot, Emergency System Restart, and System Cold Start
Term
_____________ is a system failure where secure conditions are maintained.
Definition
Fail Secure
Term
______________ is a system failure where the system permits traffic in the event of a failure.
Definition
Fail soft or Fail open
Term
_________ is a system that upon failure will cause no harm.
Definition
Fail Safe
Term
What are the three types of standby systems?
Definition
Cold, Warm, and Hot
Term
What are the six parts of a media management process?
Definition
Marking, Labeling, Handling, Storing, Declassifying, and destroying
Term
Due to a software bug and a reload of the firewall, the firewall has lost its complete configuration. After that happened, all firewall ports shut down. This is known as ___________.
Definition
Fail Secure
Term
What is the best way to control users with elevated system privileges?
Definition
Rotation of duties
Term
Which RAID configuration offers the usable disk storage as the sum of all disk capacities?
Definition
RAID 0
Term
Which RAID configuration offers the lowest cost of redundancy?
Definition
RAID 5
Term
+92Security administrator responsibilities include reviewing audit log data, setting access permissions, conducting vulnerability assessments, and _________.
Definition
Setting File-sensitivity labels
Term
Media Management practices include media marking, labeling, handling, storing, ______________________.
Definition
Declassifying and destroying
Term
Which backup type is the replication of data on separate disks in real time?
Definition
Data Mirroring
Term
A _________ is a set of disk drives connected to a separate optical network for the use of servers.
Definition
Storage Area Network
Term
Configuring traffic priority controls on devices is the responsibility of the _____________.
Definition
Network Administrator
Term
Backup integrity is assured with __________.
Definition
Backup verification
Term
A hot spare in a RAID array that is a backup for a specific disk in the array is called a _____________.
Definition
Dedicated spare
Term
Ensuring availability of data is the responsibility of the ________________.
Definition
Data librarian
Term
A review of an operator's shift logs can be identified as which type of control?
Definition
Detective
Term
What are the four types of controls?
Definition
Preventative, Detective, Recovery, and Deterrent
Term
A group of disks connected to the same network, used by all clients and servers is known as a ____________
Definition
NAS
Term
What is the most secure way to dispose of a CD-RW?
Definition
Physically destroy it
Term
Change control procedures include request, impact, assessment, approval, build and test, and _______________.
Definition
Implement and monitor
Supporting users have an ad free experience!