9. Resilience & Physical security Flashcards

1
Q

What are the key components of physical security?

A
  • Bollards
  • Access control vestibule
  • Fencing
  • Video surveillance
  • Security guard
  • Access badge
  • Lighting
  • Sensors

These components work together to enhance the overall security posture of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of physical attacks are mentioned?

A
  • Brute force
  • Radio frequency identification (RFID) cloning
  • Environmental

Understanding these types of attacks is crucial for implementing effective security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the considerations for security architecture?

A
  • Availability
  • Resilience
  • Cost
  • Responsiveness
  • Scalability
  • Ease of deployment
  • Risk transference
  • Ease of recovery
  • Patch availability
  • Inability to patch
  • Power
  • Compute

These factors influence the effectiveness and efficiency of security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between load balancing and clustering?

A

Load balancing distributes workloads across multiple resources while clustering involves connecting multiple computers to work together as a single system.

Both techniques are important for achieving high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the types of site considerations for resilience?

A
  • Hot
  • Cold
  • Warm
  • Geographic dispersion

These site types help organizations plan for disaster recovery and continuity of operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is included in capacity planning?

A
  • People
  • Technology
  • Infrastructure

Effective capacity planning ensures that an organization can handle expected workloads and emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of testing methods for resilience?

A
  • Tabletop exercises
  • Failover
  • Simulation
  • Parallel processing

These methods help organizations prepare for and respond to incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are key aspects of backups?

A
  • Onsite/offsite
  • Frequency
  • Encryption
  • Snapshots
  • Recovery
  • Replication
  • Journaling

Backups are essential for data preservation and recovery during failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of power management in resilience?

A
  • Generators
  • Uninterruptible power supply (UPS)

Reliable power sources are critical for maintaining operations during outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Resilience is a part of the availability leg of the CIA triad.

A

True

The CIA triad stands for Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Physical access to systems, networks, and devices is one of the easiest ways to ______ security controls.

A

[bypass]

This highlights the importance of physical security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are response and recovery controls designed to ensure?

A

They help to ensure that an organization can remain online and recover from issues.

These controls are vital for maintaining business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the importance of establishing restoration order for systems and devices?

A

It ensures that critical systems are prioritized during recovery processes.

This helps minimize downtime and impact on operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three components of the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is availability critical for an organization’s security?

A

Systems that are offline or unavailable do not meet business needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is continuity of operations?

A

Ensuring that operations continue despite issues like system failures or natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a common method to build resilience in systems?

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define single point of failure.

A

A point where the failure of a single device or connection can disrupt the entire system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is geographic dispersion in the context of redundancy?

A

Placing datacenters at least 90 miles apart to prevent disasters from disabling multiple facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of load balancing?

A

To distribute loads among multiple systems or services, providing redundancy and increasing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does clustering refer to in system design?

A

Groups of computers connected to perform the same task, providing redundancy through scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of uninterruptible power supply (UPS) systems?

A

To provide backup power options for short outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is platform diversity?

A

Using different technologies and vendors to make systems less vulnerable to attacks or failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the architectural considerations for security design?

A

Availability targets, resilience, cost, responsiveness, scalability, ease of deployment, risk transference, ease of recovery, patch availability, and power consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is RAID used for?

A

To use multiple disks for data protection, ensuring data is not lost during disk failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe RAID 0.

A

Data is striped across all drives for better I/O performance but is not fault tolerant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the advantage of RAID 1?

A

High read speeds and data availability if a drive fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does RAID 5 provide?

A

Striping with parity, allowing for recovery from a single drive failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the difference between full, incremental, and differential backups?

A

Full: copies entire system; Incremental: captures changes since last backup; Differential: captures changes since last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is replication in data management?

A

Copying live data to another location or device continuously as changes are made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define journaling.

A

Creating a log of changes that can be reapplied if an issue occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or False: Journaling eliminates the need for backups.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are recovery point objectives (RPOs)?

A

Determinations of how much data loss is acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are recovery time objectives (RTOs)?

A

Determinations of how long recovery can take without significant damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a snapshot in data backup?

A

A complete capture of the state of a system at a specific point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the primary use of forensic images?

A

To capture a bitwise copy of an entire storage device with data validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a gold master image?

A

A non-modified image used for creating nonpersistent systems in virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Fill in the blank: Backup frequency should be determined by the rate of change, the organization’s tolerance for _______.

A

data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a gold master image in virtualization systems?

A

A gold master image is a base image used to create nonpersistent systems that remain unchanged after shutdown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Why is it important to validate backup copies?

A

Validation ensures that the backup matches the original file, confirming its integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What factors should organizations consider when choosing backup media?

A
  • Capacity
  • Reliability
  • Speed
  • Cost
  • Expected lifespan
  • Reusability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which backup media option has historically been one of the lowest-cost-per-capacity?

A

Tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the advantages of using disks for backup over tape?

A

Disks are typically faster, although more expensive for the same capacity as tape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

True or False: Optical media like Blu-ray discs are commonly used for large-scale backups.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Fill in the blank: Flash media like microSD cards and USB thumb drives are often used for _______.

A

short-term copies and longer-term backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the key difference between online and offline backups?

A

Online backups are always available, while offline backups need to be retrieved from a storage location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are nearline backups?

A

Backup storage that is not immediately available but can be retrieved within a reasonable time, often without human involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What type of cloud backup provides lower prices for slower access times?

A

Long-term archival storage models like Amazon’s S3 Glacier.

49
Q

How has the changing model for backups affected what is backed up?

A

Instead of backing up systems, the code that defines them and key data is backed up.

50
Q

What is off-site storage?

A

A method of storing backup media at a location separate from the primary site to ensure data safety.

51
Q

What are some risks associated with poorly executed off-site storage?

A

Lack of distance from the primary site, inadequate security during transit, and lack of encryption.

52
Q

What bandwidth considerations should organizations keep in mind for off-site backups?

A

Bandwidth for backups and restoration time, especially for low bandwidth locations.

53
Q

What is a key security consideration for backups in remote storage?

A

Encryption of data both at rest and in transit.

54
Q

What role do encryption keys play in backup recovery?

A

They are critical for restoring backups; losing access to keys means losing the backups.

55
Q

True or False: Cloud providers often have lower reliability rates than local tape or disk options.

56
Q

What types of controls are necessary for using third-party backup services?

A

Separation of accounts, additional controls, and encryption of data.

57
Q

What are response controls?

A

Controls used to allow organizations to respond to an issue, whether it is an outage, a compromise, or a disaster.

58
Q

What is the main focus of recovery controls?

A

Returning to normal operations.

59
Q

Define nonpersistence in the context of response controls.

A

The ability to have systems or services that are spun up and shut down as needed.

60
Q

How do systems revert to a known state?

A

Using snapshots in a virtualization environment or other tools that track changes.

61
Q

What is a last-known good configuration?

A

A state that allows returning to a previous configuration before an issue occurred.

62
Q

What is live boot media?

A

A bootable operating system that can run from removable media like a thumb drive or DVD.

63
Q

What are high-availability solutions?

A

Solutions like load balancing, content distribution networks, and clustered systems that respond to high-demand scenarios.

64
Q

What is vertical scalability?

A

Requires a larger or more powerful system or device.

65
Q

What is horizontal scaling?

A

Uses smaller systems or devices and adds more of them.

66
Q

List the three major types of disaster recovery sites.

A
  • Hot sites
  • Warm sites
  • Cold sites
67
Q

What is a hot site?

A

A site with all the infrastructure and data needed to operate the organization.

68
Q

What is a warm site?

A

A site that has some systems needed but lacks live data.

69
Q

What is a cold site?

A

A site with space, power, and connectivity but not prepared with systems or data.

70
Q

What is the restoration order?

A

The sequence in which systems and services are restored after a disaster.

71
Q

What key issue was highlighted by the aftermath of 9/11 regarding disaster recovery?

A

The need to ensure staff availability during a disaster.

72
Q

What is geographic dispersion?

A

The practice of building infrastructure across multiple geographic regions to avoid disasters impacting multiple sites.

73
Q

What are the three areas of focus for capacity planning?

A
  • People
  • Technology
  • Infrastructure
74
Q

What is the purpose of tabletop exercises?

A

Discussions to validate the disaster recovery plan with personnel assigned roles.

75
Q

What is a simulation exercise?

A

Drills where personnel simulate actions they would take in an actual event.

76
Q

What is a parallel processing exercise?

A

Moving processing to a backup system to validate its performance.

77
Q

What is a failover exercise?

A

Testing full failover to an alternate site or system.

78
Q

Why is it important to take notes during testing exercises?

A

To review what worked and did not work, and to apply lessons learned.

79
Q

What are physical security controls?

A

Measures like fences, lighting, and locks that protect systems, facilities, and networks from unauthorized access.

80
Q

What is the purpose of site security?

A

To implement a security plan based on threats and risks relevant to specific locations.

81
Q

What is security through obscurity?

A

The belief that hiding resources and data will prevent or persuade malicious actors from attacking.

82
Q

How do fences contribute to physical security?

A

They act as a deterrent and provide a physical barrier against unauthorized access.

83
Q

What are bollards?

A

Posts or obstacles that prevent vehicles from moving through an area.

84
Q

How does lighting enhance security?

A

Bright lighting discourages intruders and helps staff feel safer.

85
Q

Fill in the blank: Drones can be used to capture images, deliver a payload, or _______.

A

[take action like cutting a wire or blocking a camera]

86
Q

What are antidrone systems designed to do?

A

Detect and counteract drones using various technologies like radar and infrared sensors.

87
Q

True or False: Locks are a genuine physical security control.

88
Q

What role do access badges play in physical security?

A

They are used for entry access and to verify identity and authorization.

89
Q

What are access control vestibules also known as?

90
Q

What types of fire suppression systems are commonly used?

A
  • Wet sprinkler systems
  • Dry sprinklers
  • Pre-action sprinklers
  • Deluge sprinklers
91
Q

What are the main types of alarm systems?

A
  • Locally monitored
  • Remotely monitored
92
Q

What is a common phrase among security professionals regarding locks?

A

“Locks keep honest people honest.”

93
Q

What is a key challenge of using security guards?

A

Humans can be fallible and susceptible to social engineering.

94
Q

What are the types of cameras used in video surveillance?

A
  • Black and white
  • Infrared
  • Color
95
Q

What is the purpose of motion recognition cameras?

A

To activate when motion occurs, conserving storage space.

96
Q

What are the four specific types of sensors mentioned?

A
  • Infrared sensors
  • Pressure sensors
  • Microwave sensors
  • Ultrasonic sensors
97
Q

What are indicators of malicious activity for physical attacks?

A

Require in-person observation or detection using a camera system.

98
Q

What is a brute-force attack in the context of physical security?

A

Breaking down doors, cutting off locks, or applying force for physical entry.

99
Q

What is an environmental attack?

A

Targeting an organization’s heating and cooling systems or maliciously activating a sprinkler system.

100
Q

What is the key part of ensuring the availability of your systems and services?

A

Building a resilient infrastructure with the ability to recover from issues.

101
Q

What types of systems help provide resilience?

A

Redundant systems, networks, and other infrastructure and capabilities.

102
Q

Name a technique that helps maintain organizational online status during disasters.

A

Geographic dispersal.

103
Q

What is the purpose of high-availability designs?

A

To handle scaling and system/component failures.

104
Q

What are multicloud systems used for?

A

To avoid a vendor’s outage or failure from causing broader issues.

105
Q

What backup systems help control power-related events?

A

Generators and UPS systems.

106
Q

What are the three types of backups you should know?

A
  • Full backup
  • Differential backup
  • Incremental backup
107
Q

What is a snapshot in the context of backups?

A

A copy of the state of a system at a point in time.

108
Q

What is the function of journaling in backup systems?

A

Records changes, allowing for them to be replicated if needed.

109
Q

How can the response to an outage impact an organization?

A

It can make the difference between being back online quickly or being offline for an extended period.

110
Q

What are key parts of being ready for an issue?

A
  • Capacity planning
  • Testing
  • Designing for continuity of operations
111
Q

What are the three types of disaster recovery sites?

A
  • Hot sites
  • Warm sites
  • Cold sites
112
Q

What is a hot site?

A

A disaster recovery site built and fully ready to go.

113
Q

What does knowing the restoration order during a restoration event help with?

A

Bringing systems and services online in an order that makes sense based on dependencies and criticality.

114
Q

What does site security involve?

A
  • Using controls to make facilities less likely to be targeted
  • Fences
  • Bollards
  • Lighting
  • Access badges
  • Entry access systems
115
Q

True or False: Detecting physical attacks requires less care than automated detection.

116
Q

What is the role of sensors in physical security?

A

To detect issues and events and to trigger responses.

117
Q

What does CASB stand for?

A

Cloud Access Security Broker

118
Q

What is the primary function of a cloud access security broker?

A

Security policy enforcement point positioned between enterprise users and cloud service providers