Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Advanced Security Practitioner (CASP) CAS-003, CH3: Key Terms (Reverse Definitions)

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
28-05-2022
Written in
2020/2021

CompTIA Advanced Security Practitioner (CASP) CAS-003, CH3: Key Terms (Reverse Definitions) Ans: informative security policy A list of permissions attached to an object, including files, folders, servers, routers, and so on. Such rule sets can be implemented on firewalls, switches, and other infrastructure devices to control access. Ans: access control list (ACL) A security control that is implemented to administer an organization's assets and personnel and includes security policies, procedures, standards, and guidelines that are established by management. Ans: administrative control Ans: advisory security policy Ans: annualized loss expectancy (ALE) Ans: annualized rate of occurrence (ARO) Any object that is of value to an organization, including personnel, facilities, devices, and so on. Ans: asset Ans: asset value (AV) A value that describes what percentage of the time a resource or data is available. The tenet of the CIA triad that ensures that data is accessible when and where it is needed. Ans: availability An information security governance component that acts as a reference point that is defined and captured to be used as a future reference. Both security and performance baselines are used. Ans: baseline A plan that considers all aspects that are affected by a disaster, including functions, systems, personnel, and facilities, and lists and prioritizes the services that are needed, particularly the telecommunications and IT functions. Ans: business continuity plan (BCP) Ans: checksum Ans: clandestine A security control that substitutes for a primary access control and mainly acts as a mitigation to risks. Ans: compensative control The tenet of the CIA triad which ensures that data is protected from unauthorized disclosure. Ans: confidentiality A business continuity document that considers all aspects that are affected by a disaster, including functions, systems, personnel, and facilities and that lists and prioritizes the services that are needed, particularly the telecommunications and IT functions. Ans: continuity of operations plan (COOP) A security control the reduces the effect of an attack or another undesirable event. Ans: corrective control Ans: countermeasure Ans: covert A plan that documents standard procedures for internal and external communications in the event of a disruption using a crisis communications plan. It also provides various formats for communications appropriate to the incident. Ans: crisis communications plan A set of policies and procedures that serve to protect and recover assets and mitigate risks and vulnerabilities. Ans: critical infrastructure protection (CIP) plan A plan that establishes procedures to address cyber attacks against an organization's information system(s). Ans: cyber incident response plan A security control that detects an attack while is is occurring to alert appropriate personnel. Ans: detective control A security control that deters potential attacks. Ans: deterrent control A method of providing sender authentication and message integrity. The messages acts as an input to a hash function, and the sender's private key encrypts the hash value. The receiver can perform a hash computation on the received message to determine the validity of the message. Ans: digital signature A security control that specifies an acceptable practice in an organization. Ans: directive control An information system focused plan deigned to restore operability of the target system, application, or computer facility infrastructure at an alternate site after an emergency. Ans: disaster recovery plan (DRP) Ans: encryption Ans: exposure factor (EF) Ans: external actor Ans: guideline A person who uses the same tools and techniques as a hacker but does so to disrupt services and bring attention to a political or social cause. Ans: hactivist A one-way function that reduces a message to a hash value. If the sender's has value is compared to the receiver's hash value, message integrity is determined. If the resultant hash values are different, the message has been altered in some way, provided that both other sender and receiver used the same hash function. Ans: hash A leased facility that contains all the resources needed for full operation. Ans: hot site A plan that provides established procedures for the assessment and recovery of a system following a system disruption. Ans: information system contingency plan (ISCP) Ans: informative security policy Ans: inherent risk A characteristic which assures that data has not changed in any way. The tenet of the CIA triad which ensures that data is accurate and reliable. Ans: intergrity Ans: internal actor Ans: issue-specific security policy Ans: likelihood Ans: load balancing Ans: logical control Ans: magnitude Ans: management control Ans: maximum period time of disruption (MPTD) Ans: mean time to repair (MTTR) Ans: maximum tolerable downtime (MTD) Ans: mean time between failures (MTBF) Ans: motivation Ans: occupant emergency plan Ans: organizational security policy Ans: overt Ans: physical control Ans: policy Ans: preventive control Ans: procedure Ans: qualitative risk analysis Ans: quantitative risk analysis Ans: recovery control Ans: recovery point objective (RPO) Ans: recovery time objective (RTO) Ans: redundant array of independent disks (RAID) Ans: regulatory security policy Ans: residual risk Ans: risk Ans: risk acceptance Ans: risk avoidance Ans: risk management Ans: risk mitigation Ans: risk transference Ans: security requirements traceability matrix (SRTM) Ans: single loss expectancy (SLE) Ans: stakeholder Ans: standard Ans: steganography Ans: system-specific security policy Ans: technical control Ans: threat Ans: threat agent Ans: vulnerability Ans: work recovery time (W

Show more Read less
Institution
Course

Content preview

CompTIA Advanced Security Practitioner
(CASP) CAS-003, CH3: Key Terms (Reverse
Definitions)
Ans: informative security policy

A list of permissions attached to an object, including files, folders, servers, routers, and so on.
Such rule sets can be implemented on firewalls, switches, and other infrastructure devices to
control access. Ans: access control list (ACL)

A security control that is implemented to administer an organization's assets and personnel and
includes security policies, procedures, standards, and guidelines that are established by
management. Ans: administrative control

Ans: advisory security policy

Ans: annualized loss expectancy (ALE)

Ans: annualized rate of occurrence (ARO)

Any object that is of value to an organization, including personnel, facilities, devices, and so on.
Ans: asset

Ans: asset value (AV)

A value that describes what percentage of the time a resource or data is available. The tenet of
the CIA triad that ensures that data is accessible when and where it is needed. Ans: availability

An information security governance component that acts as a reference point that is defined and
captured to be used as a future reference. Both security and performance baselines are used.
Ans: baseline

A plan that considers all aspects that are affected by a disaster, including functions, systems,
personnel, and facilities, and lists and prioritizes the services that are needed, particularly the
telecommunications and IT functions. Ans: business continuity plan (BCP)

Ans: checksum

Ans: clandestine

A security control that substitutes for a primary access control and mainly acts as a mitigation to
risks. Ans: compensative control

, The tenet of the CIA triad which ensures that data is protected from unauthorized disclosure.
Ans: confidentiality

A business continuity document that considers all aspects that are affected by a disaster,
including functions, systems, personnel, and facilities and that lists and prioritizes the services
that are needed, particularly the telecommunications and IT functions. Ans: continuity of
operations plan (COOP)

A security control the reduces the effect of an attack or another undesirable event. Ans:
corrective control

Ans: countermeasure

Ans: covert

A plan that documents standard procedures for internal and external communications in the event
of a disruption using a crisis communications plan. It also provides various formats for
communications appropriate to the incident. Ans: crisis communications plan

A set of policies and procedures that serve to protect and recover assets and mitigate risks and
vulnerabilities. Ans: critical infrastructure protection (CIP) plan

A plan that establishes procedures to address cyber attacks against an organization's information
system(s). Ans: cyber incident response plan

A security control that detects an attack while is is occurring to alert appropriate personnel. Ans:
detective control

A security control that deters potential attacks. Ans: deterrent control

A method of providing sender authentication and message integrity. The messages acts as an
input to a hash function, and the sender's private key encrypts the hash value. The receiver can
perform a hash computation on the received message to determine the validity of the message.
Ans: digital signature

A security control that specifies an acceptable practice in an organization. Ans: directive control

An information system focused plan deigned to restore operability of the target system,
application, or computer facility infrastructure at an alternate site after an emergency. Ans:
disaster recovery plan (DRP)

Ans: encryption

Ans: exposure factor (EF)

Written for

Course

Document information

Uploaded on
May 28, 2022
Number of pages
5
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4874
Member since
4 year
Number of followers
3232
Documents
55394
Last sold
1 day ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1185 reviews

5
624
4
216
3
196
2
40
1
109

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions