Documentation and Processes Flashcards

(59 cards)

1
Q

Used to provide a comprehensive security management framework for the organization | Policies, standards, baselines, guidelines, procedures

A

IT Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Defines the role of security inside of an organization and establishes the desired end state for that security program | Organizational, system-specific, issue-specific

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides framework to meet the business goals and define the roles, responsibilities, and terms associated with it

A

Organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Addresses the security of a specific technology, application, network, or computer system

A

System-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Addresses a specific security issue such as email privacy, employee termination procedures, or other specific issues

A

Issue-specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Implements a policy in an organization

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

creates a reference point in network architecture and design

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recommended action that allows for exceptions and allowances in unique situations

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shows the actual physical arrangement of the components that make up the network

A

Physical Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

lllustrates the flow of data across a network and shows how devices communicate with each other

A

Logical Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Labels which cables are connected to which ports

A

Wiring Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Planning and designing a wireless network to deliver the required wireless solution

A

Radio Frequency (Wireless) Site Survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Determines if a site has the right amount of power, space, and cooling to support a new upgrade or installation

A

Wired Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Delivered after a formal assessment has been conducted

A

Audit and Assessment Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on

A

Baseline Configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Changes will be properly tested and approved to be part of the new baseline

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Systematic approach to the governance and realization of value of things over their life cycle | Tangible assets, intangible assets

A

Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asset management is a systematic process of:

A

Development, operation, maintenance, upgrade, disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A database system allows for the detailed management and configurations of assets

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

With asset management how do you uniquely identify each and every workstation out there?

A

Unique Asset Tag - A barcode or a radio frequency ID tag that’s going to be assigned to that particular device and labeled onto it

Unique Asset ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Establish good change management practices

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Procurement Lifecycle - Birth to death of an asset

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the change management procedures?

A

Change Request - Verifies business impact

Procurement - Determines the budget

Deployment - Implements procedures in a secure configurations

Maintenance/Operations - Implements procedures for monitoring and support

Disposal - Implements procedures for sanitizing data remnants

25
Warranty & Licensing
Most pieces of software are going to be commercially procured. You need a license to use them. Keep track of licensing & all of your licenses are valid across all of your devices Which assets need which pieces of software, and therefore you can buy licenses just for the software you need for those devices
26
Asset management - how you're going to make sure you identify which user is assigned to which asset
27
Methodology and suite of tools used to plan, track, and manage the IP address space in a network infrastructure | Tracking, Planning, & Managing
IP Address Management (IPAM)
28
IPAM creates a systematic and error-resistant method of managing IP addresses in network enterprise
Automated systems detect and resolve IP conflicts and ensure two devices are not assigned to the same IP address
29
Automated IPAM systems can be configured to seamlessly interact with DHCP and DNS servers
IPAM solutions can be used by network admins for comprehensive reporting | IPAM can also be used by cybersecurity teams to determine which devices are allowed to connect to the network | IPAM provides the ability to help identify any unauthorized devices or suspicious traffic patterns
30
When it comes to IP address management (IPAM) remember the following:
Is the methodology and a suite of tools that are used to plan, track, and manage the IP address space inside your org's enterprise network infrastructure
31
Defines what data is confidential and cannot be shared outside of a relationship | administrative control
Non-Disclosure Agreement (NDA)
32
Non-binding agreement between two or more organizations to detail what common actions they intend to take | letter of intent
Memorandum of Understanding (MOU)
33
Documents the quality, availability, and responsibilities agreed upon by a service provider and a client
Service-Level Agreement (SLA)
34
When it comes to a version of Windows there is mainstream support and extended support
Mainstream support - minimum of 5 years Extended support - 3 to 5 years
35
Product that is no longer supported
Legacy OS
36
Orchestrated strategy to transition from an existing state to a more desirable future state
Change Management
37
At the core disruption of existing processes by and kind of change will effect its efficiency and effectiveness
Change management ensures seamless integration of changes into existing architecture and processes
38
Body of representatives from various parts of an organization that is responsible for evaluation of any proposed changes
Change Advisory Board (CAB)
39
Individual or team that initiates the change request
Change Owner
40
Any person who has a vested interest in the proposed change
Stakeholder
41
Integral part of change management process that involves understanding the change's potential fallout
Impact Analysis
42
What could go wrong? What would be the immediate effects? How would the long-term operations be impacted? Are there unforeseen challenges that might cause an issue?
Change management is a critical process that guides organizations safely through any changes or transformations needed
43
Focuses on maintaining up-to-date documentation of a network's configuration | asset management, baselining, cable management, network documentation
Configuration Management
44
Formalized system of tracking networks components and managing their lifecycle | Prepare, plan, design, implement, operate, optimize
Asset Management
45
Collection of data under normal operating conditions | useful when checking what's normal when troubleshooting network issues
Create a Baseline
46
Process of documenting the network's existing cable infrastructure | Diagrams, cable labeling, locations of punch-down blocks, cable location source, cable location destination
Cable Management
47
Using standard naming convention is considered best practice
48
Document the network appropriately | keep materials up to date | contact info of admins, policies, network maps and diagrams, documentation, wiring schematics, standard operating procedures and instructions
Network Documentation
49
Involves planning, testing, implementing, and auditing of software patches | Provides security, increase uptime, ensures compliance, improves features
Patch Management
50
Ensure patches don't create new problems once installed
51
How to effectively conduct patch management by following four critical steps:
Planning - Tracks available patches and updates and determines how to test and deploy each patch Testing - Tests any patch received from a manufacturer prior to automating its deployment through the network Implementing/Implementation - Deploys the patch to all of the workstations and servers that require it Auditing
52
Have a small test network, lab, or machine for testing new patches before deployment
Disable the Windows Update service from running automatically on the workstation & also implement patching through a mobile device manager (MDM), if needed
53
Patch rings - Update computers in small groups instead of all at once.
54
Scans the network and determines if the patch was installed properly and if there are any unexpected failures that may have occurred | conduct firmware management for network devices
Auditing
55
Which term specifically denotes a formal contractual arrangement between a service provider and a client, detailing the anticipated standard of service?
SLA
56
Which type of diagram would you use for information flow between networking devices?
Logical diagram - depict the logical relationships and info flow between network devices, making them the appropriate choice for illustrating info flow in a network
57
Which of the following is a tangible asset?
Servers = are assets that can be touched or handled
58
Which of the following is a key feature of an IPAM solution?
It allows comprehensive reporting for network performance analysis and anomaly detection & is a methodology and suite of tools to plan, track, and manage the IP address space in a network infrastructure.
59
Which of the following is a formalized system for tracking network components and managing their life cycle?
Asset Management - Is a system to track and manage assets from the point of purchase to disposal.