The components, including people, information, and conditions, that support business objectives is called ___?
BUSINESS DRIVERS
The process of ensuring that the items in each domain of the IT infrastructure meet or exceed security goals is called ___?
COMPLIANCE
A quality method indicating a continuous process consisting of four repeating steps and is known as ___ or ____? (PDCA)
DEMING CYCLE/PLAN-DO-CHECK-ACT (PDCA)
The ongoing attention and care an organization places on security and compliance is called ___?
DUE DILIGENCE
A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns is called ___?
INTRUSION DETECTION SYSTEM (IDS)
A network device or software that can analyze traffic and detect a potential intrusion based on traffic patterns and can also change firewall rules in real time to prevent further damage from an attack is called ___?
INTRUSION PREVENTION SYSTEM (IPS)
A shortened unique string of digits that represents a file or message is called ___?
MESSAGE DIGEST
The process of implementing the security controls within the IT infrastructure is called ___?
SECURITY ADMINISTRATION
FALSE
PDCA repeats and does not end
Deliver AUP training
Availability
IDS
IPS
Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
TRUE
Integrity
Confidentiality
MBDA
FALSE
Security standard
DACL
GPMC
TRUE