Aup Security Plus
66 community-sourced questions and answers. Free — no login.
Acceptable use policy (AUP)
Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.
Administrator
The user who is accountable and responsible for the network.
Annualized loss expectancy (ALE)
A calculation used to identify risks and calculate the expected monetary loss each year.
Annualized rate of occurrence (ARO)
The probability of an event occurring within a year.
ARO
Annualized rate of occurrence
Asset
Any resource of economic value that you want to secure and protect.
Audit files
Files that hold information about audit events.
AUP
Acceptable use policy
Backup
Duplicate copies of key information, ideally stored in a location other than the one where the information is stored currently.
Backup plan
A documented plan governing backup situations.
Best practices
A set of rules governing basic operations based on methods that have consistently shown superior results over those achieved by other means.
BIA
Business impact analysis
Business impact analysis (BIA)
The process of evaluating all critical systems in an organization to define impact and recovery plans.
Change management
The structured approach followed to modify individuals or teams for securing a company's assets.
Client
A part of a client/server network where computing is done. In a typical setting, a client uses the server for remote storage, backups, or security (such as a firewall).
Cloud computing
Hosting services and data on the Internet instead of hosting it locally.
Collusion
An agreement between individuals to commit fraud or deceit.
Configuration management
The administration of setup and configuration changes.
Disaster recovery
The ability to recover data after a disaster.
Disaster recovery plan (DRP)
A plan outlining the procedure by which data is recovered after a disaster.
Disk mirroring
A process of keeping identical copies of data on two disks to prevent the loss of data if one disk fails.
Disk striping
A process of writing data to multiple disks simultaneously in small portions called stripes.
Disk striping with parity
A fault-tolerance solution of writing data across a number of disks and recording the parity on another. In the event any one disk fails, the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data.
DRP
Disaster recovery plan
EF
Exposure factor
Encrypting file system (EFS)
A feature in NTFS on Windows-based operating systems that allows for file system-level encryption to be applied.
Event
Any noticeable action or occurrence.
Exposure factor (EF)
A calculation of how much data (or other assets) could be lost from a single occurrence. If all the data on the network could be jeopardized by a single attack, the calculation is 100 percent.
External threat
A threat that originates from outside the company.
Fail-over/failover
The process of reconstructing a system or switching over to other systems when a failure is detected.
False negatives
An error in which you are not alerted to a situation when you should be alerted due to which, you miss crucial things.
False positive
A flagged event that isn't really an event and has been falsely triggered.
Fault tolerance
The ability to withstand a fault (failure) without losing data.
High availability
Measures used to keep services and systems operational during an outage.
Identification and authentication (I&A)
A two-step process of identifying a person (usually when they log on) and authenticating them by challenging their claim to access a resource.
Incident management
A process to identify, analyze, and correct threats to prevent future re-occurrence.
Mandatory vacations
Time required by users to take away from work to refresh.
Mean time between failure (MTBF)
The measure of the anticipated incidence of failure of a system or component.
Mean time to repair (MTTR)
Measurement of how long it takes to repair a system or component once a failure occurs.
MTTF
Average time to failure for a non-repairable system.
MTTR
Mean time to repair
National Institute of Standards and Technology (NIST)
An agency (formerly known as the National Bureau of Standards(NBS)) that has been involved in developing and supporting standards for the U.S. government for over 100 years. It has become involved in cryptography standards, systems, and technology in a variety of areas. It's primarily concerned with governmental systems, where it exercises a great deal of influence.
Policies
Rules or stands governing usage. These are typically high level in nature.
Privacy policy
Defines what controls are required to implement and maintain the sanctity of data privacy in the work environment.
RAID
Redundant Array of Independent (or Inexpensive) Disks
RAID levels
A set of RAID configurations that consists of striping, mirroring, or parity.
Recovery point objective
Defines the point at which the system needs to be restored.
Recovery time objective
Maximum amount of time that a process or service is allowed to be down and consequences still be considered acceptable.
Redundancy
Refers to systems that either are duplicated or failover to other systems in the event of a malfunction.
Redundant Array of Independent (or Inexpensive) Disks (RAID)
A configuration of multiple hard disks used to provide fault tolerance, should a disk fails, or gains in efficiency. Different levels exist.
Replication
The process of copying directory information to other servers to keep them all synchronized.
Risk acceptance
The choice you must make when the cost of implementing any of the other four choices exceeds the value of the harm that would occur if the risk came to fruition.
Risk analysis
An evaluation of each risk that can be identified. Each risk should be outlined, described, and evaluated on the likelihood of it occurring.
Risk assessment
Deals with the threats, vulnerabilities, and impacts of a loss of information-processing capabilities or a loss of information itself.
Risk avoidance
Involves identifying a risk and making the decision to no longer engage in the actions associated with that risk.
Risk calculation
Weighs a potential threat against the likelihood or probability of it occurring.
Risk deterrence
Involves understanding about the enemy and letting them know the harm that can come their way if they cause harm to you.
Risk mitigation
Accomplished any time you take steps to reduce risk.
Risk transference
Involves sharing some of the risk burden with someone else, such as an insurance company.
Security policies
Rules set in place by a company to ensure the security of a network. These may include how often a password must be changed or how many characters a password should be.
Server
A computer that provides resources to clients on the network.
Single loss expectancy (SLE)
A cost of a single loss when it occurs. This loss can be a critical failure, or it can be the result of an attack.
Threat vectors
Ways in which an attacker poses a threat.
Uninterruptible power supply (UPS)
A device that can provide short-term power, usually be using batteries.
User
A person using a computer or network or a resource.
Vulnerability
A weakness that could be exploited by a threat.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials