701 - Chapter 1 Flashcards

1
Q

What prevents the unauthorized disclosure of information, it keeps secret information secret?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What prevents the unauthorized alteration of information or systems. It keeps our information safe from unintentional or accidental changes.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What insurer authorized users are able to access information and systems when they need them?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two ways to ensure confidentiality?

A

Encryption and access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Within access controls, what are the three core identity and access management activities that help ensure that only authorized person can access data?

A

Identification, authentication, authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Within access controls, users claim and identity with a unique username. What is this called?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Within access control, what is it called when users prove their identity for example with a password?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within access control, this can grant or restrict access to resources uses using such things as permissions, what is this called?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You can increase availability by adding what and what? Give some examples.

A

Fault tolerance, and redundancy… RAID, failover clusters, backups, generators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common goal of fault tolerance, and redundancy techniques?

A

To remove each single point of failure, SPOF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAID is an example of what type of redundancy?

A

Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Failover clusters are an example of what type of redundancy?

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Load balancing uses multiple servers to support a single service such as a high volume website, what type of redundancy is that?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UPS and power generators can provide power to key systems if commercial power fails, what type of redundancy is this?

A

Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called to put two or more network cards in a single server? And what type of redundancy is this?

A

NIC teaming…network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two things that can contribute to high availability?

A

Scalability and elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of scalability?

A

Horizontal and vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adding additional servers would be an example of this type of scalability? Adding additional resources (for example, adding more RAM) to the existing servers is an example of this type of scaling?

A

Horizontal and vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is called when scalability is automated by having the system add and remove resources as needed?

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an alternative to seeking the highest possible availability?

A

resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Resiliency methods help system _____ themselves or recover from _____ with minimal downtime?

A

Heal and Faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resiliency methods also expect components to do what with fail processes? Give an example.

A

Retry… Examples would include the chrome browser and also TCP packets, when failing to reach the destination, TCP packets will be resent

23
Q

Organizations frequently need to balance resource availability with what? And why is this difficult to do?

A

Security constraints… it is difficult because when applying security constraint, such as encryption, it will require more memory and processing power in addition to slowing down applications

24
Q

What is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss?

A

Risk

25
Q

What is any circumstance or event that has the potential to compromise CIA?

A

Threat

26
Q

What is another name for a weakness?

A

A vulnerability

27
Q

What is an adverse event or series of events that can negatively affect the CIA of an organizations IT?

A

A security incident

28
Q

What are four types of threats?

A

Insider, an outside attacker, natural, accidental

29
Q

What is the process of reducing the chances that a threat will exploit of vulnerability or reduces the impact of the threat?

A

Risk mitigation

30
Q

What do organizations implement to help mitigate risk?

A

Security controls also called counter measures and safeguards

31
Q

What are some examples of technical controls?

A

Encryption, antivirus software, IDS and IPS, firewalls , least privilege

32
Q

Where are managerial controls typically documented?

A

In an organizations written security policy

33
Q

What type of control is implemented by people who performed the day-to-day operations to comply with an organizations overall security plan?

A

Operational controls

34
Q

What are three ways of assessing risk within managerial controls?

A

Quantitative and qualitative risk assessments, vulnerability assessments

35
Q

What are the three families of operational controls?

A

Awareness and training, configuration management, media protection

36
Q

Name some examples of the preventative control type?

A

Hardening, training, security guards, account disablement process, IPS

37
Q

What control type is put in place to discourage a threat? Give some examples.

A

Deterrent… Warning signs and login banners

38
Q

This type of control is used to discover an event after it has occurred? Give some examples.

A

Detective… Log monitoring, SIEM Systems, security audit, video surveillance, motion detection, IDS

39
Q

This control type attempts to reverse the impact of an incident or problem after it has occurred? Give some examples.

A

Corrective… Back ups/system recovery and incident handling processes

40
Q

This control type provides an alternate control instead of using a primary control?

A

Compensating

41
Q

This control type is designed to provide instruction to individuals and how they should handle security related situations that arise? Give some examples.

A

Directive… Policy, standards, procedures, guidelines and change management

42
Q

What are the three primary windows operating system logs?

A

Security, system, application

43
Q

What directory does Linux Systems store logs in?

A

/var/log

44
Q

Which Lennox log contain a wide variety of general system Messages including startup, mail, kernel messages?

A

Syslog or messages

45
Q

Which Linux log contains information related to authentication and authorization of user sessions?

A

Secure log

46
Q

What are three examples of network logs?

A

Firewall, IPS/IDS, packet captures

47
Q

What is the type of application log that follows the W3C common log format?

A

Web server logs

48
Q

Within an SIEM system, what is called the process of combining several similar items into a single similar format?

A

Log aggregation

49
Q

Within an SIEM system, what is the software component used to collect an analyze event log data from various systems within the network?

A

The correlation engine

50
Q

Within an SIEM system, this focuses on what users are doing such as application and network activity, and is looking for abnormal patterns of activity that may indicate malicious intent?

A

User behavior analysis, UBA

51
Q

What are the agents that an SIEM system places on Systems throughout a network called? These collect logs and send the logs to the SIEM system.

A

Sensors

52
Q

What are some common elements in a SIEM dashboard?

A

Sensors, alerts, correlation, trends

53
Q

What is the protocol that specifies a general log entry format and the details on how to transport log entries?

A

Syslog

54
Q

The system sending Syslog messages is called what? And what is the recipient of the syslog entries?

A

Originators and collectors