100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA Advanced Security Practitioner (CASP) CAS-003, CH3: Key Terms (Reverse Definitions) $7.99   Add to cart

Exam (elaborations)

CompTIA Advanced Security Practitioner (CASP) CAS-003, CH3: Key Terms (Reverse Definitions)

 3 views  0 purchase
  • Course
  • Institution

CompTIA Advanced Security Practitioner (CASP) CAS-003, CH3: Key Terms (Reverse Definitions) Ans: informative security policy A list of permissions attached to an object, including files, folders, servers, routers, and so on. Such rule sets can be implemented on firewalls, switches, and other ...

[Show more]

Preview 2 out of 5  pages

  • May 28, 2022
  • 5
  • 2020/2021
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CompTIA Advanced Security Practitioner
(CASP) CAS-003, CH3: Key Terms (Reverse
Definitions)
Ans: informative security policy

A list of permissions attached to an object, including files, folders, servers, routers, and so on.
Such rule sets can be implemented on firewalls, switches, and other infrastructure devices to
control access. Ans: access control list (ACL)

A security control that is implemented to administer an organization's assets and personnel and
includes security policies, procedures, standards, and guidelines that are established by
management. Ans: administrative control

Ans: advisory security policy

Ans: annualized loss expectancy (ALE)

Ans: annualized rate of occurrence (ARO)

Any object that is of value to an organization, including personnel, facilities, devices, and so on.
Ans: asset

Ans: asset value (AV)

A value that describes what percentage of the time a resource or data is available. The tenet of
the CIA triad that ensures that data is accessible when and where it is needed. Ans: availability

An information security governance component that acts as a reference point that is defined and
captured to be used as a future reference. Both security and performance baselines are used.
Ans: baseline

A plan that considers all aspects that are affected by a disaster, including functions, systems,
personnel, and facilities, and lists and prioritizes the services that are needed, particularly the
telecommunications and IT functions. Ans: business continuity plan (BCP)

Ans: checksum

Ans: clandestine

A security control that substitutes for a primary access control and mainly acts as a mitigation to
risks. Ans: compensative control

, The tenet of the CIA triad which ensures that data is protected from unauthorized disclosure.
Ans: confidentiality

A business continuity document that considers all aspects that are affected by a disaster,
including functions, systems, personnel, and facilities and that lists and prioritizes the services
that are needed, particularly the telecommunications and IT functions. Ans: continuity of
operations plan (COOP)

A security control the reduces the effect of an attack or another undesirable event. Ans:
corrective control

Ans: countermeasure

Ans: covert

A plan that documents standard procedures for internal and external communications in the event
of a disruption using a crisis communications plan. It also provides various formats for
communications appropriate to the incident. Ans: crisis communications plan

A set of policies and procedures that serve to protect and recover assets and mitigate risks and
vulnerabilities. Ans: critical infrastructure protection (CIP) plan

A plan that establishes procedures to address cyber attacks against an organization's information
system(s). Ans: cyber incident response plan

A security control that detects an attack while is is occurring to alert appropriate personnel. Ans:
detective control

A security control that deters potential attacks. Ans: deterrent control

A method of providing sender authentication and message integrity. The messages acts as an
input to a hash function, and the sender's private key encrypts the hash value. The receiver can
perform a hash computation on the received message to determine the validity of the message.
Ans: digital signature

A security control that specifies an acceptable practice in an organization. Ans: directive control

An information system focused plan deigned to restore operability of the target system,
application, or computer facility infrastructure at an alternate site after an emergency. Ans:
disaster recovery plan (DRP)

Ans: encryption

Ans: exposure factor (EF)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart