- A _____ is a security weakness or soft spot. Vulnerability
- In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited. Risk
- _____ costs include expenses for items such as supplies, equipment rental, and software leases. Operational
- _____ ensures that authorized users have timely and reliable access to necessary information. Availability
- _____ expenses vary significantly during a system’s operational life and include spending to support maintenance activities. Maintenance
- _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. Maintenance activities
- _____ is a process for controlling changes in system requirements during software development. Configuration management
- _____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service. Capacity planning
- _____ is the overall time between a request for system activity and the delivery of the response. Response time
- _____ measures risk likelihood and impact. Risk assessment
- _____ measures the time between submitting a request for information and the fulfillment of the request. Turnaround time
- _____ prevents unauthorized users from creating, modifying, or deleting information. Integrity
- _____ protects information from unauthorized disclosure and safeguards privacy. Confidentiality
- _____, a risk control strategy, eliminates risks by adding protective safeguards. Avoidance
- A _____ is a formal reference point that measures system characteristics at a specific time. Baseline
- A(n) _____ is an attack that takes advantage of a vulnerability. Exploit
- Adaptive maintenance _____. adds enhancements to an operational system and makes the system easier to use
- As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____. corrective maintenance
- As shown in the accompanying figure, near the end of a system’s useful life, _____ when it becomes clear that a company plans to replace the system. adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
- Corrective maintenance _____. diagnoses and corrects errors in an operational system
- George’s firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George’s responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
One of his firm’s clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident? Extortion - In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data. Metrics
- Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills. programmer/analyst
- Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels. privilege escalation attack
- When a new version of a system is installed, the prior release is _____, or stored. Archived
Other Links:
See other websites for quiz:
Check on QUIZLET