701 - Chapter 9 Flashcards

1
Q

What type of security control is something you can physically touch such as a lock, a fence, and a ID badge, a security camera?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can serve as an access badge to secure access to certain areas? And how do they work? And what can be added to these for multi factor authentication?

A

Proximity or smart cards… users pass the card near a proximity card reader and the card reader then reads data on the card…a PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What else can be used to control access to building and secure spaces to deter security incidents?

A

Security guards or a receptionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What physical control can provide reliable proof of a persons, location and activity by identifying who enters and exits secure areas?

A

Video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false closed circuit television CC TV can be used as a compensating control in some situations

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What monitors the environment and can detect changes? What are some common types of these?

A

Sensors… motion detection , noise detection, infrared temperature monitor, pressure monitor, microwaves monitor, ultrasonic waves monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What provides a barrier around a property and deters people from entering? What also is visible especially around entrances and can deter attackers from trying to break?

A

A fence…lights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an important to do with lighting? Why and how?

A

Protect them… because if they don’t work, they can’t do their job… By placing them high enough out of reach or surrounding them with a metal cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Military bases often erect these, while a business uses these? In both cases, what are they deterring?

A

Barricades…bollards… a person driving in to the structure that they are protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a physical barrier between the outside world and a data center, consisting of two sets of interlocking doors designed to create a secure compartment that allows only one person to enter at a time? What are the doors usually equipped with? And what are they preventing?

A

Access control vestibule… Biometric scanners, RFID card readers or facial recognition systems…tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the process of tracking valuable assets throughout their life cycle?

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the process that provides consistent procedures for identifying the need for new assets, And effectively on boarding and managing new vendors

A

Acquisition/procurement process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the process that assigns each asset to a named owner who bears responsibility for the asset and a classification system that identifies as sensitivity and criticality of each asset to the organization?

A

Assignment/accounting process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the process that maintains an inventory of all of the assets owned by the organization and their current current location?

A

Monitoring and asset tracking process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the process to track servers, desktop, computers, laptop computers, router, switches, and other hardware assets?

A

Hardware asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What vulnerabilities can be reduced with a hardware asset management process?

A

Architecture and design weaknesses, system sprawl and undocumented assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What automated method can be implemented to assist with inventory control for hardware asset management?

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What involves tracking and managing software licenses, installations, and usage within an organization? And how does it help?

A

Software asset management… it helps with licensing compliance, optimizes software usage, minimizes the risk of security vulnerabilities associated with unpatched or unauthorized software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the security practice of implementing several layers of protection called?

A

Defense in depth, also known as layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the different types of diversity for layered security?

A

Vendor diversity, technology diversity, control diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the practice of implementing security controls from different vendors to increase security? And What is an example of this?

A

Vendor diversity…To implement a screened subnet requires two firewalls…using firewalls from different vendors means it is unlikely to develop a vulnerability at the same time in each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the practice of using different technologies to protect an environment?

A

Technology diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the use of different security control categories to protect an environment called?

A

Control diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the practice of illegally capturing credit card data at the point of sale? And what is the practice of making a copy of a credit card using data captured from a magnetic strip called

A

Credit card skimming… card cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the type of physical attack that can be rudimentary but effective? And what type of attack will disrupt By going after a power source or flooding it with water to cause a catastrophe?

A

Brute force attack… environmental attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is adding duplication to critical system components and networks called? And what does it provide? And what are these trying to eliminate?

A

Redundancy… fault tolerance… single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are five types of redundancies that organizations will implement?

A

Disc redundancies using RAID, NIC redundancy with NIC teaming, server redundancies by adding load balancers, power redundancies by adding generators or UPSes, site redundancies by adding hot cold or warm sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is any component whose failure results in the failure of an entire system called?

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or false people can never be a single point of failure

A

False… if that person is the only one with expertise on how to perform a specific task, they can become a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True or false RAID-0 or striping Provides redundancy and fault tolerance

A

False it provides neither as its benefit is increased read and right performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is RAID-1 called? And how does it provide redundancy? And how can redundancy be further added?

A

Mirroring… By having two discs store the same information… by adding a disc controller to both drives, this is called disc duplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is RAID-5? And what happens if there is a disk failure?

A

Three or more discs that are striped together and including parity information… The disk can be re-created by reading the remaining good disks information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is RAID-6? And what is the benefit?

A

An extension of raid-5 with an additional parity block and disc… if two drives should fail you can still recover the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What combines the features of mirroring RAID-1 and striping RAID-0?

A

RAID-10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Of the RAID types, which ones provide fault tolerance and increased data availability? Which can survive the failure of one disc and which can survive the failure of two discs

A

1,5 and 6…1,5…6

36
Q

What refers to a system or serviced that needs to remain operational with almost 0 downtime? And what can help achieve this?

A

Hi availability… high capacity load balancers

37
Q

What type of load balancer can optimize and distribute data across multiple computers or multiple networks? With this type of load balancing, what type of concept can be implemented?

A

Active/active… clustering

38
Q

True or false low balancers are hardware only?

A

False, they can be software as well

39
Q

What what does load balancing primarily provide?

A

Scalability

40
Q

In load balancers, what insures users will go to a specific server? And what does that provide?

A

Source address affinity… it provides session persistence

41
Q

What are the two types of load balancer configuration?

A

Active/active… active/passive

42
Q

In load balancing, what configuration ensures that if the active server fails, the inactive server takes over? And what is the monitoring connection between the servers called?

A

Active/passive… a heartbeat

43
Q

What are two scheduling methods that an active/active low balance or uses?

A

Round robin and source IP address affinity

44
Q

What allows you to group 2 or more physical network adapters into a single software based virtual network adapter?

A

NIC teaming

45
Q

True or false NIC teaming eliminates any physical NIC as a single point of failure?

A

True

46
Q

What provides short term power and can protect against power fluctuations?

A

UPS

47
Q

What can provide a second power supply if a primary power supply fails?

A

Dual supply

48
Q

What can provide long-term power during extended outages?

A

Generators

49
Q

What can monitor the quality of power such as voltage current and power consumption and report these measurements to central monitoring console?

A

Managed power distribution units

50
Q

What are four types of backup media?

A

Tape, network attached storage NAS, storage area network SAN, cloud storage

51
Q

Of the backup media, what can be used for real time replication of #DATA?

A

SAN

52
Q

What type of backup uses traditional backup media, such as tapes, local discs, drives in a NAS? And what type of stored with a cloud?

A

Off-line… online

53
Q

What are two limiting factors to doing full backups all the time?

A

Time to take the full backup and the cost of storage required for full backups

54
Q

Which back up starts with a full back up and then backs up data that has changed or is different since that last full back up?

A

Differential back up

55
Q

Which back up starts with a full back up and then backs up data that has changed since the last backup?

A

Incremental back up

56
Q

If you have unlimited time and money, which back up provides the fastest recovery time? Which back up reduces the amount of time needed perform back ups? Which backup reduces the amount of time needed to restore backups.

A

Full… incremental… Differential

57
Q

Which backup captures the data at a moment in time and is commonly used with VMs?

A

A snapshot back up

58
Q

What is the process of creating an exact copy of data or a system in real time or near real time? What is the backup technique that records changes to data or file sequentially in a separate log?

A

Replication… journaling

59
Q

What is the best way to confirm the integrity of a companies backup data and its process?

A

Test restores

60
Q

True or false back up media does not need to be protected with the same level of protection as the data on the back up?

A

False, it needs to be protected to the same level

61
Q

What protects back ups against a disaster such as a fire or a flood?

A

Storing at least one copy of the back ups offsite

62
Q

What refers to the legal implications when data is stored offsite, if they are stored in a different country, they are subject to that country‘s law?

A

Data Sovereignty

63
Q

What plays a vital role in securing backup data both in transit and at rest?

A

Encryption

64
Q

What helps an organization predict in plan for potential outages of critical services or functions, and contains the steps used to return critical functions to operations after an outage?

A

Business continuity plan BCP

65
Q

This important part of a BCP helps an organization, identifies mission essential functions and critical systems that are essential to the organizations success?

A

Business impact analysis BIA

66
Q

What are some of the questions that are addressed by a BIA?

A

What are the critical systems and functions? are there any dependencies related to those? What is the maximum downtime limit? What scenarios are most likely to impact these? What is the potential loss from these?

67
Q

What are some of the scenarios that a BIA evaluates?

A

Natural disasters, fires, attacks, power outages, data loss, hardware/software failures

68
Q

What is the maximum amount of time it can take to restore a system after an outage? What refers to the amount of data you can afford to lose?

A

Recovery time objective RTO… recovery point objective RPO

69
Q

What is the average time between failures called? And what do higher numbers indicate?

A

Meantime between failures MTBF… a higher reliability in a system

70
Q

What is the average time it takes to restore a failed system called?

A

Meantime to repair MTTR

71
Q

What plan focuses on restoring mission essential functions at a recovery site after a critical outage?

A

Continuity of operations planning COOP

72
Q

What is an alternate processing site that an organization has? And what does it offer?

A

A recovery site…site resilience

73
Q

What are the three types of recovery sites? And what is important to keep in mind when planning for these sites?

A

Hot, cold, warm… geographic dispersion

74
Q

Of the three recovery site types which one includes the personnel, equipment, software, and communication capabilities of the primary site with all the data up-to-date?

A

Hot site

75
Q

Which recovery site type provides the shortest recovery time, Is the most effective disaster recovery solution but is also the most expensive to maintain?

A

Hot site

76
Q

Which recovery site type requires power and connectivity but not much else? What is a pro and what is a con?

A

Cold site… cheapest to maintain but most difficult to test

77
Q

Which recovery site type has all the necessary hardware but not include up-to-date data?

A

Warm site

78
Q

What site does not have dedicated locations, but can provide temporary support during a disaster?

A

A mobile site

79
Q

When restoring to a primary site after a disaster, which functions are restored first? And why?

A

The least critical functions… It’s very likely there are still some unknown problems and by moving the lease critical first you will help uncover those problems

80
Q

What identifies how to recover critical systems and data after a disaster, and often prioritizes the services to restore?

A

Disaster recovery plan DRP

81
Q

What validates the disaster recovery plan? And what is the final phase of the DRP?

A

Testing… An after action report to identify lessons, learn and also any updates to the plan

82
Q

What is a discussion based version of testing a DRP?

A

A tabletop exercise

83
Q

What are functional exercises that allow personnel to test the DRP in a test operational environment?

A

Simulations

84
Q

What type of DRP test allows FOR THE PARTICIPANTS TO TAKE ACTUAL PHYSICAL OR ACTIONS?

A

Parallel processing

85
Q

Which DRP allows the shutting down of the primary site and testing where the recovery site properly handles the load?

A

Fail over test

86
Q

What is the process of determining the resources required to meet the demands of an organizations, operations and growth, and analyzes in forecasts the organizations resource needs?

A

Capacity planning

87
Q

What are the three main areas regarding capacity planning?

A

People, technology, infrastructure