100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSX Study Guide Questions and Answers 100% Pass £10.48
Add to cart

Exam (elaborations)

CSX Study Guide Questions and Answers 100% Pass

 0 view  0 purchase
  • Module
  • CSX
  • Institution
  • CSX

CSX Study Guide Questions and Answers 100% Pass Acceptable Interruption Window - The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise's business objectives. Acceptable Use Policy - A policy that establishes an agreement between users ...

[Show more]

Preview 3 out of 24  pages

  • January 9, 2025
  • 24
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSX
  • CSX
avatar-seller
1|Page




CSX Study Guide Questions and
Answers 100% Pass

Acceptable Interruption Window - ✔✔The maximum period of time that a system can be unavailable

before compromising the achievement of the enterprise's business objectives.


Acceptable Use Policy - ✔✔A policy that establishes an agreement between users and the enterprise and

defines for all parties the ranges of use that are approved before gaining access to a network or the

Internet.


Access Control list - ✔✔An internal computerized table of access rules regarding the levels of computer

access permitted to logon ID's and computer terminals.


Access Path - ✔✔The logical route that an end user takes to access computerized information. Typically

includes a route through the OS, telecomm software, selected application software and the access control

system.


Access Rights - ✔✔The permission or privileges granted to users, programs, or workstations to create,

change, delete, or view data and files within a system , as defined by rules established by data owners

and the information security policy.


Accountability - ✔✔The ability to map a given activity or event back to the responsible party.


Advanced Encryption Standard - ✔✔A public algorithm that supports keys from 128 bits to 256 bits in

size.




Emily Charlene © 2025, All Rights Reserved.

,2|Page


Advanced persistent threat - ✔✔An adversary that possess sophisticated level of expertise and significant

resources which allow it to create opportunities to achieve its objectives using multiple attack vectors. It

pursues its objectives repeatedly over an extended period of time, it adapts to defenders efforts to resist it

and is determined to maintain the level of interaction needed to execute its objectives


Adversary - ✔✔A threat agent


Adware - ✔✔A software package that automatically play displays or downloads advertising material to a

computer after the software is installed on it or while the application is being used.


Alert situation - ✔✔The point in an emergency procedure when the elapsed time passes a threshold and

the interuption is not resolved.


Alternate facilities - ✔✔Locations and infrastructures from which emergency or backup processes are

executed when the main premises are unavailable or destroyed; includes buildings offices or data

processing centers.


Alternate processes - ✔✔Automatic or maual process designed and established to continure critical

business processes from point of failute to return to normal.


Analog - ✔✔A transmission signal that varies continuously in amplitude and time and is generated in

wave formation. Used in telecommunications.


Anti-malware - ✔✔A technology widely used to prevent, detect, and remoce many categories of malware

including computer viruses, worms, trojans, keyloggere, malicious browser plug in, adware and

spyware.


Anti-virus software - ✔✔An application software deployed at multiple points in an IT architecture to

detect and potentially eliminate virus code before damage is done and repair or quarentine files that have

already been infected.




Emily Charlene © 2025, All Rights Reserved.

, 3|Page


Application Layer - ✔✔This provides services for an applicaiton program to ensure that effective

communication with another application program in a network is possible.


Architecture - ✔✔Decription of the fundamental underlying design of the components of the business

system or of one element of the business system, the relationships amoung them and the manner in

which they support an enterprise.


Asset - ✔✔Something of either tangible or intangible value that is worth protecting


Asymmetric key - ✔✔A cipher technique used in which different cryptographic keys are tied to encrypt

and decrypt a message.


Attack - ✔✔An actual occurance of an adverse effect


Attack mechanism - ✔✔A method used to deliver the payload and may involve an exploit delivering a

payload to the target.


Attack vector - ✔✔A path or route used by the adversary to gain access to the target (asset) Two types:

ingress and egress


Attenuation - ✔✔Reduction of signal strength during transmission


Audit Trail - ✔✔A visable trail of evidence enabling one to trace information contained in statements or

reports back to the original input source.


Authentication - ✔✔The act of verifying the identity of a user and the users eligiability to access

computerized information.


Authenticity - ✔✔Undisputed authorship.


Availability - ✔✔Ensuring timely and reliable access to and use of info




Emily Charlene © 2025, All Rights Reserved.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EmilyCharlene. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £10.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

51292 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£10.48
  • (0)
Add to cart
Added