The mailing list includes announcements and discussion of an open-source IDPS

  •  If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well.

  • An effective security program demands comprehensive and continuous understanding of program and system configuration.

  • Over time, external monitoring processes should capture information about the external environment in a format that can be referenced both across the organization as threats emerge and for historical use.

  • The value of internal monitoring is low when the resulting knowledge of the network and systems configuration is fed into the vulnerability assessment and remediation maintenance domain.

  •  Policy needs to be reviewed and refreshed from time to time to ensure that it’s sound.

  •  ____ are a component of the security triple.

  • When the memory usage associated with a particular CPU-based system averages ____% or more over prolonged periods, consider adding more memory.

  • A(n) ____ item is a hardware or software item that is to be modified and revised throughout its life cycle.

  •  A ____ is the recorded state of a particular revision of a software or hardware configuration item.

  • The ____ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

  • The ____ commercial site focuses on current security tool resources.

  • The ____ mailing list includes announcements and discussion of an open-source IDPS.

  • The optimum approach for escalation is based on a thorough integration of the monitoring process into the ____.

  • Detailed ____ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.

  • One approach that can improve the situational awareness of the information security function uses a process known as ____ to quickly identify changes to the internal environment.

  • ____ is used to respond to network change requests and network architectural design proposals.

  • There are ____ common vulnerability assessment processes.

  • The ____ vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organization’s networks.

    What are a component of the security triple?

    These three components are the cornerstone for any security professional, the purpose of any security team.

    Which of the following is designed to find and document vulnerabilities that may be present in the organization's public network?

    The platform security validation (PSV) process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization.

    Is a center of Internet security expertise and is located at the Software Engineering Institute?

    The CERT® Computer Emergency Response Team Coordination Center CERT/CC is a center of Internet security expertise. It is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

    Why should agencies monitor the status of their programs?

    to ensure that they are current, accurate, and appropriate.