Data Remanence Accurate Answer - The remains of partial or even the
entire data set of digital information
Disaster Recovery Planning (DRP) Accurate Answer - Deals with
restoring normal business operations after the disaster takes place...works to
get the business back to normal
Maximum tolerable downtime Accurate Answer - The maximum
period of time that a critical business function can be inoperative before the
company incurs significant and long-lasting damage.
802.5 Accurate Answer - IEEE standard defines the Token Ring media
access method
Recovery Time Objective Accurate Answer - The balance against the
cost of recover and the cost of disruption
Resource Requirements Accurate Answer - portion of the BIA that lists
the resources that an organization needs in order to continue operating each
critical business function.
Checklist Accurate Answer - Test is one in which copies of the plan are
handed out to each functional area to ensure the plan deal with their needs
,Information Owner Accurate Answer - The one person responsible for
data, its classification and control setting
Job Rotation Accurate Answer - To move from location to location,
keeping the same function
Differential power analysis Accurate Answer - A side-channel attack
carry-out on smart cards that examining the power emission release during
processing
Mitigate Accurate Answer - Defined as real-time monitoring and
analysis of network activity and data for potential vulnerabilities and attacks
in
progress.
Electromagnetic analysis Accurate Answer - A side-channel attack on
smart cards that examine the frequencies emitted and timing
Analysis Accurate Answer - Systematic assessment of threats and
vulnerabilities that provides a basis for effective management of risk.
Change Control Accurate Answer - Maintaining full control over
requests, implementation, traceability, and proper documentation of changes.
Containment Accurate Answer - Mitigate damage by isolating
compromised systems from the network.
,30 to 90 Days Accurate Answer - Most organizations enforce policies to
change password ranging from
Isochronous Accurate Answer - Process must within set time
constrains, applications are video related where audio and video must match
perfectly
Detection Accurate Answer - Identification and notification of an
unauthorized and/or undesired action
Electronic Vaulting Accurate Answer - Periodic, automatic and
transparent backup of data in bulk.
Fault Tolerance Accurate Answer - Mitigation of system or component
loss or interruption through use of backup capability.
Incremental Accurate Answer - A backup method use when time and
space are a high importance
Secure HTTP Accurate Answer - Protocol designed to same individual
message securely
Criminal Accurate Answer - Conduct that violates government laws
developed to protect society
, Class C Accurate Answer - Has 256 hosts
RAID 0 Accurate Answer - Creates one large disk by using several disks
Trade secrets Accurate Answer - Deemed proprietary to a company
and often include information that provides a competitive edge, the
information is protected as long the owner takes protective actions
X.400 Accurate Answer - Active Directory standard
Prevention Accurate Answer - Controls deployed to avert unauthorized
and/or undesired actions.
Redundant Array Of Independent Drives (RAID) Accurate Answer - A
group of hard drives working as one storage unit for the purpose of speed and
fault tolerance
Proprietary Accurate Answer - Define the way in which the
organization operates.
Gateway Accurate Answer - Used to connect two networks using
dissimilar protocols at different layers of the OSI model
Classification Accurate Answer - The assignment of a level of
sensitivity to data (or information) that results in the specification of controls
for each level of classification.