IT CertificationsAnswer Key

Aup Security Plus

66 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Acceptable use policy (AUP)

ANSWER

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.

QUESTION 2

Administrator

ANSWER

The user who is accountable and responsible for the network.

QUESTION 3

Annualized loss expectancy (ALE)

ANSWER

A calculation used to identify risks and calculate the expected monetary loss each year.

QUESTION 4

Annualized rate of occurrence (ARO)

ANSWER

The probability of an event occurring within a year.

QUESTION 5

ARO

ANSWER

Annualized rate of occurrence

QUESTION 6

Asset

ANSWER

Any resource of economic value that you want to secure and protect.

QUESTION 7

Audit files

ANSWER

Files that hold information about audit events.

QUESTION 8

AUP

ANSWER

Acceptable use policy

QUESTION 9

Backup

ANSWER

Duplicate copies of key information, ideally stored in a location other than the one where the information is stored currently.

QUESTION 10

Backup plan

ANSWER

A documented plan governing backup situations.

QUESTION 11

Best practices

ANSWER

A set of rules governing basic operations based on methods that have consistently shown superior results over those achieved by other means.

QUESTION 12

BIA

ANSWER

Business impact analysis

QUESTION 13

Business impact analysis (BIA)

ANSWER

The process of evaluating all critical systems in an organization to define impact and recovery plans.

QUESTION 14

Change management

ANSWER

The structured approach followed to modify individuals or teams for securing a company's assets.

QUESTION 15

Client

ANSWER

A part of a client/server network where computing is done. In a typical setting, a client uses the server for remote storage, backups, or security (such as a firewall).

QUESTION 16

Cloud computing

ANSWER

Hosting services and data on the Internet instead of hosting it locally.

QUESTION 17

Collusion

ANSWER

An agreement between individuals to commit fraud or deceit.

QUESTION 18

Configuration management

ANSWER

The administration of setup and configuration changes.

QUESTION 19

Disaster recovery

ANSWER

The ability to recover data after a disaster.

QUESTION 20

Disaster recovery plan (DRP)

ANSWER

A plan outlining the procedure by which data is recovered after a disaster.

QUESTION 21

Disk mirroring

ANSWER

A process of keeping identical copies of data on two disks to prevent the loss of data if one disk fails.

QUESTION 22

Disk striping

ANSWER

A process of writing data to multiple disks simultaneously in small portions called stripes.

QUESTION 23

Disk striping with parity

ANSWER

A fault-tolerance solution of writing data across a number of disks and recording the parity on another. In the event any one disk fails, the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data.

QUESTION 24

DRP

ANSWER

Disaster recovery plan

QUESTION 25

EF

ANSWER

Exposure factor

QUESTION 26

Encrypting file system (EFS)

ANSWER

A feature in NTFS on Windows-based operating systems that allows for file system-level encryption to be applied.

QUESTION 27

Event

ANSWER

Any noticeable action or occurrence.

QUESTION 28

Exposure factor (EF)

ANSWER

A calculation of how much data (or other assets) could be lost from a single occurrence. If all the data on the network could be jeopardized by a single attack, the calculation is 100 percent.

QUESTION 29

External threat

ANSWER

A threat that originates from outside the company.

QUESTION 30

Fail-over/failover

ANSWER

The process of reconstructing a system or switching over to other systems when a failure is detected.

QUESTION 31

False negatives

ANSWER

An error in which you are not alerted to a situation when you should be alerted due to which, you miss crucial things.

QUESTION 32

False positive

ANSWER

A flagged event that isn't really an event and has been falsely triggered.

QUESTION 33

Fault tolerance

ANSWER

The ability to withstand a fault (failure) without losing data.

QUESTION 34

High availability

ANSWER

Measures used to keep services and systems operational during an outage.

QUESTION 35

Identification and authentication (I&A)

ANSWER

A two-step process of identifying a person (usually when they log on) and authenticating them by challenging their claim to access a resource.

QUESTION 36

Incident management

ANSWER

A process to identify, analyze, and correct threats to prevent future re-occurrence.

QUESTION 37

Mandatory vacations

ANSWER

Time required by users to take away from work to refresh.

QUESTION 38

Mean time between failure (MTBF)

ANSWER

The measure of the anticipated incidence of failure of a system or component.

QUESTION 39

Mean time to repair (MTTR)

ANSWER

Measurement of how long it takes to repair a system or component once a failure occurs.

QUESTION 40

MTTF

ANSWER

Average time to failure for a non-repairable system.

QUESTION 41

MTTR

ANSWER

Mean time to repair

QUESTION 42

National Institute of Standards and Technology (NIST)

ANSWER

An agency (formerly known as the National Bureau of Standards(NBS)) that has been involved in developing and supporting standards for the U.S. government for over 100 years. It has become involved in cryptography standards, systems, and technology in a variety of areas. It's primarily concerned with governmental systems, where it exercises a great deal of influence.

QUESTION 43

Policies

ANSWER

Rules or stands governing usage. These are typically high level in nature.

QUESTION 44

Privacy policy

ANSWER

Defines what controls are required to implement and maintain the sanctity of data privacy in the work environment.

QUESTION 45

RAID

ANSWER

Redundant Array of Independent (or Inexpensive) Disks

QUESTION 46

RAID levels

ANSWER

A set of RAID configurations that consists of striping, mirroring, or parity.

QUESTION 47

Recovery point objective

ANSWER

Defines the point at which the system needs to be restored.

QUESTION 48

Recovery time objective

ANSWER

Maximum amount of time that a process or service is allowed to be down and consequences still be considered acceptable.

QUESTION 49

Redundancy

ANSWER

Refers to systems that either are duplicated or failover to other systems in the event of a malfunction.

QUESTION 50

Redundant Array of Independent (or Inexpensive) Disks (RAID)

ANSWER

A configuration of multiple hard disks used to provide fault tolerance, should a disk fails, or gains in efficiency. Different levels exist.

QUESTION 51

Replication

ANSWER

The process of copying directory information to other servers to keep them all synchronized.

QUESTION 52

Risk acceptance

ANSWER

The choice you must make when the cost of implementing any of the other four choices exceeds the value of the harm that would occur if the risk came to fruition.

QUESTION 53

Risk analysis

ANSWER

An evaluation of each risk that can be identified. Each risk should be outlined, described, and evaluated on the likelihood of it occurring.

QUESTION 54

Risk assessment

ANSWER

Deals with the threats, vulnerabilities, and impacts of a loss of information-processing capabilities or a loss of information itself.

QUESTION 55

Risk avoidance

ANSWER

Involves identifying a risk and making the decision to no longer engage in the actions associated with that risk.

QUESTION 56

Risk calculation

ANSWER

Weighs a potential threat against the likelihood or probability of it occurring.

QUESTION 57

Risk deterrence

ANSWER

Involves understanding about the enemy and letting them know the harm that can come their way if they cause harm to you.

QUESTION 58

Risk mitigation

ANSWER

Accomplished any time you take steps to reduce risk.

QUESTION 59

Risk transference

ANSWER

Involves sharing some of the risk burden with someone else, such as an insurance company.

QUESTION 60

Security policies

ANSWER

Rules set in place by a company to ensure the security of a network. These may include how often a password must be changed or how many characters a password should be.

QUESTION 61

Server

ANSWER

A computer that provides resources to clients on the network.

QUESTION 62

Single loss expectancy (SLE)

ANSWER

A cost of a single loss when it occurs. This loss can be a critical failure, or it can be the result of an attack.

QUESTION 63

Threat vectors

ANSWER

Ways in which an attacker poses a threat.

QUESTION 64

Uninterruptible power supply (UPS)

ANSWER

A device that can provide short-term power, usually be using batteries.

QUESTION 65

User

ANSWER

A person using a computer or network or a resource.

QUESTION 66

Vulnerability

ANSWER

A weakness that could be exploited by a threat.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials