100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSX Study Guide with 100% correct Answers $11.99   Add to cart

Exam (elaborations)

CSX Study Guide with 100% correct Answers

 0 view  0 purchase
  • Course
  • CSX
  • Institution
  • CSX

Exam of 19 pages for the course CSX at CSX (CSX Study Guide)

Preview 3 out of 19  pages

  • September 10, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSX
  • CSX
avatar-seller
millyphilip
CSX Study Guide
Acceptable Interruption Window - Answer -The maximum period of time that a system
can be unavailable before compromising the achievement of the enterprise's business
objectives.

Acceptable Use Policy - Answer -A policy that establishes an agreement between users
and the enterprise and defines for all parties the ranges of use that are approved before
gaining access to a network or the Internet.

Access Control list - Answer -An internal computerized table of access rules regarding
the levels of computer access permitted to logon ID's and computer terminals.

Access Path - Answer -The logical route that an end user takes to access computerized
information. Typically includes a route through the OS, telecomm software, selected
application software and the access control system.

Access Rights - Answer -The permission or privileges granted to users, programs, or
workstations to create, change, delete, or view data and files within a system , as
defined by rules established by data owners and the information security policy.

Accountability - Answer -The ability to map a given activity or event back to the
responsible party.

Advanced Encryption Standard - Answer -A public algorithm that supports keys from
128 bits to 256 bits in size.

Advanced persistent threat - Answer -An adversary that possess sophisticated level of
expertise and significant resources which allow it to create opportunities to achieve its
objectives using multiple attack vectors. It pursues its objectives repeatedly over an
extended period of time, it adapts to defenders efforts to resist it and is determined to
maintain the level of interaction needed to execute its objectives

Adversary - Answer -A threat agent

Adware - Answer -A software package that automatically play displays or downloads
advertising material to a computer after the software is installed on it or while the
application is being used.

Alert situation - Answer -The point in an emergency procedure when the elapsed time
passes a threshold and the interuption is not resolved.

,Alternate facilities - Answer -Locations and infrastructures from which emergency or
backup processes are executed when the main premises are unavailable or destroyed;
includes buildings offices or data processing centers.

Alternate processes - Answer -Automatic or maual process designed and established to
continure critical business processes from point of failute to return to normal.

Analog - Answer -A transmission signal that varies continuously in amplitude and time
and is generated in wave formation. Used in telecommunications.

Anti-malware - Answer -A technology widely used to prevent, detect, and remoce many
categories of malware including computer viruses, worms, trojans, keyloggere,
malicious browser plug in, adware and spyware.

Anti-virus software - Answer -An application software deployed at multiple points in an
IT architecture to detect and potentially eliminate virus code before damage is done and
repair or quarentine files that have already been infected.

Application Layer - Answer -This provides services for an applicaiton program to ensure
that effective communication with another application program in a network is possible.

Architecture - Answer -Decription of the fundamental underlying design of the
components of the business system or of one element of the business system, the
relationships amoung them and the manner in which they support an enterprise.

Asset - Answer -Something of either tangible or intangible value that is worth protecting

Asymmetric key - Answer -A cipher technique used in which different cryptographic
keys are tied to encrypt and decrypt a message.

Attack - Answer -An actual occurance of an adverse effect

Attack mechanism - Answer -A method used to deliver the payload and may involve an
exploit delivering a payload to the target.

Attack vector - Answer -A path or route used by the adversary to gain access to the
target (asset) Two types: ingress and egress

Attenuation - Answer -Reduction of signal strength during transmission

Audit Trail - Answer -A visable trail of evidence enabling one to trace information
contained in statements or reports back to the original input source.

Authentication - Answer -The act of verifying the identity of a user and the users
eligiability to access computerized information.

, Authenticity - Answer -Undisputed authorship.

Availability - Answer -Ensuring timely and reliable access to and use of info

Back Door - Answer -A means of regaining access to a compromised system by
installing software of configuring exiting software to enable remote access under
attacker defined conditions

Bandwidth - Answer -The range between the highest and lowest transmitable
frequencies. It equates to the transmission capactiy of an electronic line and is expressd
in bytes per second or Hertz(cycles per second)

Bastion - Answer -System heaviliy fortified against attacks

Biometrics - Answer -A security technique that verifies an indiviuals identity by analyzing
a unique physical attriubte such as a handprint

Block cipher - Answer -A public algorithm that operates on plaintext in blocks, strings or
groups of bits

Botnet - Answer -A term dervived from the robot network is a large automated and
distributed network of previously compromised computers that can be simultaneously
controlled to launch a large scale attacks such as a DOS attack on selected victims.

Boundary - Answer -Logical and physical controls to define a perimeter between the org
and the outside world

Bridges - Answer -Data link layer devices developed in the 80's to connect LAN's or to
create two seperate LANs or WAN network segments from a single segment to reduce
colision domains. Acts as a store and forward devices in moving frames toward their
destination achieved by analyzing the MAC header of a data packet which represents
the hardware address of an NIC.

BYOD - Answer -An enterprise policy used to permit partial or full integration of user
owned mobile devices for busines purposes.

Broadcast - Answer -A method to distribute info to multiple recipents simultaneoulsy

Brute Force - Answer -A class of algorithms that repeatedy try al possible combinations
until a solution is found

Brute force attack - Answer -Repeatedly tryng all possible combinations of passwords or
encryptions keys until the correct one is found.

Buffer overflow - Answer -Occurs when a program or process tries to store more date in
a bufffer than it was intended to hold.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77333 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart