501 Chapter 1 Flashcards

1
Q

Describes a goal an organization wants to achieve

A

use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ prevents unauthorized disclosure of data

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ scrambles the data

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ helps ensure that only authorized persons can access the data through Identification, Authentication, Authorization

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the practice of concealing a data on to another data

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the practice of making a data uninterpretable

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ provides assurance that the data has not changed. Ensures that no one has modified, tampered with or corrupted the data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ is a number created by a hashing algorithm

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

commonly used in emails, provides nonrepudiation

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an electronic password that allows a user to securely transfer data over the Internet using PKI

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ indicates that data and services are available when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

adds duplication to critical systems and provides fault tolerance

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the common goal of redundancy is to remove

A

SPOF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPOF stands for

A

Single Point of Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a redundancy technique: see RAID 1, RAID 5, RAID 10, allows a system to operate even if a disk fails

A

Disk Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a redundancy technique: see backup servers, remote servers

A

Server Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a redundancy technique: uses multiple servers to support a single service

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a redundancy technique: see alternate site or hot site where in the event of the original site is no longer capable of functioning

A

Site Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a site that is available 24/7 with employees

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a site where employees need to go move to and start systems

A

cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a redundancy technique: see data backup, Grandfather-Father-Son backup

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a redundancy technique: see UPS, Generator

A

Alternate Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a redundancy technique: reduces outages from overheating

A

Cooling Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

use a set of changes to update, improve or debug

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
basic goal of IT security is to
reduce risk
26
is the possibility or the likelihood of a threat exploiting a vulnerability resulting in a loss
Risk
27
is any circumstance or event that has the potential to compromise confidentiality, integrity, availability
Threat
28
is a weakness. It can be in hardware, software, configuration or OS
Vulnerability
29
is an adverse event or series of events that can negatively affect the CIA of an organization. includes: attacks, malware, data loss, etc
Security Incident
30
reducing the risk or reducing the chance a threat will exploit a vulnerability: by implementing controls and many more actions to be discussed at later chapters
Risk Mitigation
31
reduces risk
Security Control
32
List the three primary control types
Technical Controls Administrative Controls Physical Controls
33
____ is a technical control used to protect the confidentiality of data. This includes data transferred over a network and data stored in devices, such as servers, PC, mobile
Encryption
34
once installed, provides protection against malware infection
Antivirus Software
35
both can monitor a network or host for intrusions and provide ongoing protection against various threats
IDS (Intrusion Detection System) and | IPS (Intrusion Prevention System).
36
this restrict network traffic going in and out of a network
Firewall.
37
specifies that individuals or processes are granted only the privileges they need to perform their assigned task or function
Least privilege
38
are combinations of rights and permissions
Privileges
39
____ use methods mandated by organizational policies or other guidelines
Administrative Controls
40
these help quantify and qualify risks within an organization so that the organization can focus on the serious risks
Risk Assessments
41
use cost and asset values to quantify risks based on the monetary value
quantitative risk assessment
42
uses judgments to categorize risks based on probability and impact
qualitative risk assessment
43
these attempts to discover current vulnerabilities or weaknesses
Vulnerability Assessments
44
are a step further from vulnerability assessments by attempting to exploit these vulnerabilities
Penetration Tests
45
many administrative controls are also known as ____ | they help ensure that day-to-day operations of an organization comply with their overall security plan
operational or management controls
46
training helps users maintain password security, follow a clean desk policy, understand threats such as phishing and malware and more
Awareness and Traning
47
conf management use baselines to ensure the system started in a secure, hardened state. change mgmt helps ensure that changes don't result in unintended configuration errors"
Configuration and change management
48
methods to help prepare for potential system outages
Contingency planning
49
includes USB, external drives, backup tapes
Media protection
50
such as cameras and door locks and heating and ventilation
Physical and environmental protection
51
are any controls you can physically touch: lighting, signs, fences, security guards, etc
Physical Controls
52
the goal is to prevent security incidents
Preventive Controls
53
is the practice of making a system or application more secure than its default configuration. This uses a defense-in-depth strategy with layered security: includes disabling unnecessary ports and services, implementing secure protocols, using strong passwords along with robust password policy and disabling default and unnecessary accounts"
Hardening
54
ensuring that users are aware of security vulnerabilities and threats helps prevents incidents
Security Awareness and Training
55
guards prevent and deter many attacks
Security Guards
56
attempt to detect when vulnerabilities have been exploited resulting in an incident
Detective Controls
57
logs record details of all traffic that firewall blocked
Log Monitoring
58
monitor logs to detect trends by analyzing past logs
Trend Analysis
59
examines the security posture of an organization
Security Audit
60
CCTV system records activity and detects what occurred. can be used as a deterrent control too
Video Surveillance
61
detect motion from potential intruders
Motion Detection
62
attempt to reverse the impact of an incident or problem after it has occurred
Corrective Controls
63
attempts to detect an attack and then modify the environment to block the attack from continuing
IPS
64
backups ensure that personnel can recover data if it is lost or corrupted. also system recovery procedures
Backups and system recovery
65
attempt to discourage a threat
Deterrent Controls
66
deters thieves from stealing laptops
Cable Locks
67
such as locked doors
Hardware Locks
68
are alternative controls used instead of a primary control
Compensating Controls
69
is a popular technology used within large data centers and can also be used on a regular personal computer. It allows you to host one or more virtual systems or VMs (Virtual Machine) on a single physical system
Virtualization
70
the software that creates, runs and manages the VMs
Hypervisor
71
the physical system hosting the VMs
Host
72
Operating systems running on the Host
Guest
73
the ability to resize computing capacity based on the load
Host elasticity and scalability
74
run directly on the system hardware. often called bare-metal hypervisors because they don't need to run within an operating system
Type I
75
run as software within a host operating system
Type II
76
is a specialized version of a Type II hypervisor. It allows services or applications to run within their own isolated cells or containers. Containers don't have a full operating system but instead, use the kernel of the host
Container Virtualization
77
it captures the state of a VM at a moment in time. Administrators often take a snapshot before performing a risky operation.
Snapshot
78
can occur if personnel within the organization don't manage the VMs.
VM sprawl
79
attack allow an attacker to access the host system from the VM. Primary protection for this is to keep the host and guests up to date with current patches.
VM escape
80
can be used to check the connectivity; check name resolution; verify that routers, firewalls, and IPS system block ICMP
Ping command
81
on windows allows you to view the configuration of network interfaces
Ipconfig command
82
on Linux and MAC allows you to view the configuration of network interfaces
Ifconfig command
83
allows you to view statistics for TCP/IP protocols and view all active network connections. Can be useful if you suspect malware is causing a computer to connect with a remote computer
Netstat command
84
lists the routers (also called hops) between two systems. It can be used to verify a path has not changed
Tracert command
85
allows you to view and manipulate the ARP cache. This is useful is you suspect a system's ARP cache has been modified during an attack
Arp (Address Resolution Protocol) command