100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSX Study Guide Questions And Answers Already Passed Graded A+. $15.49   Add to cart

Exam (elaborations)

CSX Study Guide Questions And Answers Already Passed Graded A+.

 3 views  0 purchase
  • Course
  • CSX
  • Institution
  • CSX

Acceptable Interruption Window - correct answer The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise's business objectives. Acceptable Use Policy - correct answer ...

[Show more]

Preview 3 out of 26  pages

  • August 6, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSX
  • CSX
avatar-seller
RealGrades
CSX Study Guide

Acceptable Interruption Window - correct answer The maximum period of
time that a system can be unavailable before compromising the achievement of the enterprise's
business objectives.



Acceptable Use Policy - correct answer A policy that establishes an agreement
between users and the enterprise and defines for all parties the ranges of use that are approved before
gaining access to a network or the Internet.



Access Control list - correct answer An internal computerized table of access
rules regarding the levels of computer access permitted to logon ID's and computer terminals.



Access Path - correct answer The logical route that an end user takes to access
computerized information. Typically includes a route through the OS, telecomm software, selected
application software and the access control system.



Access Rights - correct answer The permission or privileges granted to users,
programs, or workstations to create, change, delete, or view data and files within a system , as defined
by rules established by data owners and the information security policy.



Accountability - correct answer The ability to map a given activity or event
back to the responsible party.



Advanced Encryption Standard - correct answer A public algorithm that
supports keys from 128 bits to 256 bits in size.



Advanced persistent threat - correct answer An adversary that possess
sophisticated level of expertise and significant resources which allow it to create opportunities to
achieve its objectives using multiple attack vectors. It pursues its objectives repeatedly over an extended
period of time, it adapts to defenders efforts to resist it and is determined to maintain the level of
interaction needed to execute its objectives

,Adversary - correct answer A threat agent



Adware - correct answer A software package that automatically play displays
or downloads advertising material to a computer after the software is installed on it or while the
application is being used.



Alert situation - correct answer The point in an emergency procedure when
the elapsed time passes a threshold and the interuption is not resolved.



Alternate facilities - correct answer Locations and infrastructures from which
emergency or backup processes are executed when the main premises are unavailable or destroyed;
includes buildings offices or data processing centers.



Alternate processes - correct answer Automatic or maual process designed
and established to continure critical business processes from point of failute to return to normal.



Analog - correct answer A transmission signal that varies continuously in
amplitude and time and is generated in wave formation. Used in telecommunications.



Anti-malware - correct answer A technology widely used to prevent, detect,
and remoce many categories of malware including computer viruses, worms, trojans, keyloggere,
malicious browser plug in, adware and spyware.



Anti-virus software - correct answer An application software deployed at
multiple points in an IT architecture to detect and potentially eliminate virus code before damage is
done and repair or quarentine files that have already been infected.



Application Layer - correct answer This provides services for an applicaiton
program to ensure that effective communication with another application program in a network is
possible.



Architecture - correct answer Decription of the fundamental underlying design
of the components of the business system or of one element of the business system, the relationships
amoung them and the manner in which they support an enterprise.

, Asset - correct answer Something of either tangible or intangible value that is
worth protecting



Asymmetric key - correct answer A cipher technique used in which different
cryptographic keys are tied to encrypt and decrypt a message.



Attack - correct answer An actual occurance of an adverse effect



Attack mechanism - correct answer A method used to deliver the payload and
may involve an exploit delivering a payload to the target.



Attack vector - correct answer A path or route used by the adversary to gain
access to the target (asset) Two types: ingress and egress



Attenuation - correct answer Reduction of signal strength during transmission



Audit Trail - correct answer A visable trail of evidence enabling one to trace
information contained in statements or reports back to the original input source.



Authentication - correct answer The act of verifying the identity of a user and
the users eligiability to access computerized information.



Authenticity - correct answer Undisputed authorship.



Availability - correct answer Ensuring timely and reliable access to and use of
info



Back Door - correct answer A means of regaining access to a compromised
system by installing software of configuring exiting software to enable remote access under attacker
defined conditions

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller RealGrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76710 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.49
  • (0)
  Add to cart