1.1 Flashcards

1
Q

CIA means..?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CIA used for?

A

CIA is used to apply the correct security solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA - confidentiality - describe

A

Makes sure that only authorized people can see and work with the data. Can be done with encypting the data via disk or network, so the others can’t decyrp it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA - Integrity - describe

A

Makes sure that the data is sent that it arrives in the same manner which it was sent. This can be done by hashing the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA - Availability - describe

A

Is making sure that those authorized to see the data can access it whenever they need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What will compromise confidentiality?

A

Plain text protocols as html, ftp, telnet etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIEM ausgeschrieben

A

Security Information event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For what is SIEM used?

A

to give real time rpoting and long term analysis of events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SIEM provide?

A

User info (name & location), device info (model, OS version, etc) & posture info (compliance, patches etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can SIEM get Data from?

A

Routers, Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is especially good about SIEM?

A

It gives real time alerts when attacks are detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an asset?

A

An item that need to be protcted and include property, data, people that gives value to a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain vulnerability

A

a weakness in a system that can be exploited by a thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat?

A

a potential danger that exists and realized via an attack or exploit that takes advantage of an existing vulberability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a risk?

A

potential for an unauthorized attack that can be done using a specific attack on a praticular vunerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Countermeasure?

A

A safeguard that mitigates a potential risk by reducing/eliminating vulnerability

17
Q

Where are firewalls typically placed?

A

at the internet edge

18
Q

What does a firewall?

A

It enforces an access control policy

19
Q

Firewall Zones

A

Public “untrusted” Zone - outside control of company
Private “trusted” zone - owned by the company
DMZ - deimilized zone