Exam (elaborations)
CSX Study Guide Questions and Answers 100% Pass
CSX Study Guide Questions and
Answers 100% Pass
Acceptable Interruption Window - The maximum period of time that a system can be unavailable
before compromising the achievement of the enterprise's business objectives.
Acceptable Use Policy - A policy that establishes an agreement between users ...
[Show more]
Preview 3 out of 24 pages
Uploaded on
January 9, 2025
Number of pages
24
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
CSX
Course
CSX
$12.49
Also available in package deal from $69.23
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
Also available in package deal (1)
$ 171.85
$ 69.23
15 items
1. Exam (elaborations) - Csx test 2 practice questions and answers 100% pass
2. Exam (elaborations) - Csx-on track worker exam questions and answers 100% pass
3. Exam (elaborations) - Csx week 1 test questions and answers 100% pass
4. Exam (elaborations) - Csx test 2 practice questions and answers 100% pass
5. Exam (elaborations) - Csx test 2 questions and answers 100% pass
6. Exam (elaborations) - Csx rco study guide questions and answers 100% pass
7. Exam (elaborations) - Csx study guide questions and answers 100% pass
8. Exam (elaborations) - Csx safety exam questions and answers 100% pass
9. Exam (elaborations) - Csx speeds and signals exam questions and answers 100% pass
10. Exam (elaborations) - Csx redi center quiz questions and answers 100% pass
11. Exam (elaborations) - Csx railroad communication exam questions and answers 100% pass
12. Exam (elaborations) - Csx railroad basics exam questions and answers 100% pass
13. Exam (elaborations) - Csx railroad basics exam questions and answers 100% pass
14. Exam (elaborations) - Csx quiz 4 questions and answers 100% pass
15. Exam (elaborations) - Csx quiz 3 questions and answers 100% pass
Show more
1|Page
CSX Study Guide Questions and
Answers 100% Pass
Acceptable Interruption Window - ✔✔The maximum period of time that a system can be unavailable
before compromising the achievement of the enterprise's business objectives.
Acceptable Use Policy - ✔✔A policy that establishes an agreement between users and the enterprise and
defines for all parties the ranges of use that are approved before gaining access to a network or the
Internet.
Access Control list - ✔✔An internal computerized table of access rules regarding the levels of computer
access permitted to logon ID's and computer terminals.
Access Path - ✔✔The logical route that an end user takes to access computerized information. Typically
includes a route through the OS, telecomm software, selected application software and the access control
system.
Access Rights - ✔✔The permission or privileges granted to users, programs, or workstations to create,
change, delete, or view data and files within a system , as defined by rules established by data owners
and the information security policy.
Accountability - ✔✔The ability to map a given activity or event back to the responsible party.
Advanced Encryption Standard - ✔✔A public algorithm that supports keys from 128 bits to 256 bits in
size.
Emily Charlene © 2025, All Rights Reserved.
,2|Page
Advanced persistent threat - ✔✔An adversary that possess sophisticated level of expertise and significant
resources which allow it to create opportunities to achieve its objectives using multiple attack vectors. It
pursues its objectives repeatedly over an extended period of time, it adapts to defenders efforts to resist it
and is determined to maintain the level of interaction needed to execute its objectives
Adversary - ✔✔A threat agent
Adware - ✔✔A software package that automatically play displays or downloads advertising material to a
computer after the software is installed on it or while the application is being used.
Alert situation - ✔✔The point in an emergency procedure when the elapsed time passes a threshold and
the interuption is not resolved.
Alternate facilities - ✔✔Locations and infrastructures from which emergency or backup processes are
executed when the main premises are unavailable or destroyed; includes buildings offices or data
processing centers.
Alternate processes - ✔✔Automatic or maual process designed and established to continure critical
business processes from point of failute to return to normal.
Analog - ✔✔A transmission signal that varies continuously in amplitude and time and is generated in
wave formation. Used in telecommunications.
Anti-malware - ✔✔A technology widely used to prevent, detect, and remoce many categories of malware
including computer viruses, worms, trojans, keyloggere, malicious browser plug in, adware and
spyware.
Anti-virus software - ✔✔An application software deployed at multiple points in an IT architecture to
detect and potentially eliminate virus code before damage is done and repair or quarentine files that have
already been infected.
Emily Charlene © 2025, All Rights Reserved.
, 3|Page
Application Layer - ✔✔This provides services for an applicaiton program to ensure that effective
communication with another application program in a network is possible.
Architecture - ✔✔Decription of the fundamental underlying design of the components of the business
system or of one element of the business system, the relationships amoung them and the manner in
which they support an enterprise.
Asset - ✔✔Something of either tangible or intangible value that is worth protecting
Asymmetric key - ✔✔A cipher technique used in which different cryptographic keys are tied to encrypt
and decrypt a message.
Attack - ✔✔An actual occurance of an adverse effect
Attack mechanism - ✔✔A method used to deliver the payload and may involve an exploit delivering a
payload to the target.
Attack vector - ✔✔A path or route used by the adversary to gain access to the target (asset) Two types:
ingress and egress
Attenuation - ✔✔Reduction of signal strength during transmission
Audit Trail - ✔✔A visable trail of evidence enabling one to trace information contained in statements or
reports back to the original input source.
Authentication - ✔✔The act of verifying the identity of a user and the users eligiability to access
computerized information.
Authenticity - ✔✔Undisputed authorship.
Availability - ✔✔Ensuring timely and reliable access to and use of info
Emily Charlene © 2025, All Rights Reserved.