2.0 Compliance and Operational Security Flashcards

1
Q

What is Access Control?

A

Access control is the ability to permit or deny the privileges that users have when accessing resources on a network or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What processes are included in access control?

A

What processes that are included in access control are Identification, Authentication, Authorization, and Auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is MAC?

A

Mandatory Access Control (MAC) uses labels or attributes for both users and objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DAC?

A

Discretionary Access Control (DAC) assigns access directly to users based on the discretion of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RBAC?

A

Role Based Access Control (RBAC) allows access based on a role in an organization, not individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the principle of least privilege?

A

The principle of least privilege states that users or groups are given only the access they need to do their job and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is need to know?

A

Need to know describes the restriction of data that is highly sensitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is separation of duties?

A

Separation of duties is the concept of having more than one person required to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is job rotation?

A

Job rotation is a technique where users are cross-trained in multiple job positions, and where responsibilities are regularly rotated between personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is defense-in-depth?

A

Defense-in-depth is an access control method which implements multiple access control methods instead of relaying on a single method?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is creeping privileges?

A

Creeping privileges occurs when a user’s job position changes and their previous access privileges are not removed or modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a regulation?

A

A regulation is a requirement published by a government or other licensing body that must be followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a procedure?

A

A procedure is a step-by-step process outlining how to implement a specific action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a baseline?

A

A baseline dictates the settings and security mechanisms that must be imposed on a system in order to comply with required security standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a guideline?

A

A guideline is a recommendation to use when a specific standard or procedure does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is information classification?

A

Information classification is the process of determining how and what information will be disclosed to ensure an organization’s privacy requirements.

17
Q

What is business continuity?

A

Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions.

18
Q

What is a BCP?

A

A Business Continuity Plan (BCP) identifies appropriate disaster responses in order to maintain business operations during reduced or restricted infrastructure and resource capabilities.`

19
Q

What is BIA?

A

Business Impact Analysis (BIA) focuses on the impact losses will have on the organization.

20
Q

What is a DRP?

A

A Disaster Recovery Plan (DRP) identifies short-term actions to take to stop the incident and restore critical functions so the organization can continue to operate.

21
Q

What is risk management?

A

Risk management is the process or identifying vulnerabilities and threats and deciding what countermeasures to take to reduce risks to an acceptable level.

22
Q

What is a security incident?

A

A security incident is an event or series of events that are a result of a security policy violation that has adverse effects on a company’s ability to proceed with normal business.

23
Q

What is an incident response?

A

An incident response is the action taken to deal with an incident during and after the incident.

24
Q

What is social engineering?

A

Social engineering is an attack that exploits human nature by convincing someone to reveal information or perform an activity.

25
Q

What is shoulder surfing?

A

Shoulder surfing involves looking over the shoulder of someone working on a computer.

26
Q

What is eavesdropping?

A

Eavesdropping refers to an unauthorized person listening to conversations of employees or other authorized personnel discussing sensitive topics.

27
Q

What is dumpster diving?

A

Dumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.

28
Q

What is tailgating and piggybacking?

A

Piggybacking and tailgating refer to an attacker entering a secure building by following an authorized employee through a secure door and not providing identification.

29
Q

What is masquerading?

A

Masquerading refers to convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.

30
Q

What is phishing?

A

Phishing is an e-mail pretending to be from a trusted organization, asking to verify personal information or send money.

31
Q

What is spear phishing?

A

Spear phishing is targeted at gaining access to information that will allow the attacker to gain commercial advantage or commit fraud.

32
Q

What is employee management?

A

Employee management is the implementation of processes to ensure that employees play a major role in protecting company assets.

33
Q

What is fraud?

A

Fraud is the use of deception to deliberately divert company assets or profits to the employee.

34
Q

What is collusion?

A

Collusion is a situation in which multiple employees conspire to commit fraud or theft.