Ch 1. Mastering the Basics Flashcards

Presents the basics for understanding security.

1
Q

Use Case

A

used to identify and clarify requirements to achieve a goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

prevent the unauthorized disclosure of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

scrambles data to make it unreadable by unauthorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three elements of Access Controls?

A

Identification, Authentication, Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steganography

A

practice of hiding data within data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three methods of Confidentiality?

A

Encryption, Access Controls, Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A

provides assurances that data has not changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash

A

a number created by a executing a hashing algorithm against data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Signature

A

use certificates and a Public Key Infrastructure to verify integrity and provide authentication and N-R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two methods of Integrity?

A

Hashing and Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

indicates that data and services are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Redundancy

A

adds duplication to critical systems and provides fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Patch

A

code that resolves software bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two methods of Availability?

A

Redundancy and Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk

A

the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

any circumstance or event that has the potential to compromise confidentiality, integrity, or availability

17
Q

Vulnerability

A

a weakness

18
Q

Security Incident

A

an adverse event that can negatively affect the confidentiality, integrity, or availability of an org’s IT and data

19
Q

Risk Mitigation

A

reducing risk through the implementation of controls, countermeasures, or safeguards

20
Q

Types of Control Implementation

A

Technical, Administrative, Physical

21
Q

Types of Control Goals

A

Preventative, Detective, Deterrent, Corrective, Compensating

22
Q

Hypervisor

A

the software that creates, manages, and runs the VM

23
Q

NIST

A

National Institute of Standards and Technology; publishes SPs in the 800 series

24
Q

Type I Hypervisor

A

run directly on the system hardware

25
Q

Type II Hypervisor

A

runs as software within a host operating system

26
Q

Application Cell

A

runs services or applications within isolated application containers

27
Q

Snapshot

A

provides with you with a copy of a VM at a moment in time

28
Q

VM Escape

A

an attack that allows an attacker to access the host system from within the virtual system

29
Q

VM Sprawl

A

occurs when an organization has many VMs that aren’t managed properly

30
Q

ICMP

A

Internet Control Message Protocol

31
Q

NIC

A

Network Interface Controller

32
Q

VDI/VDE

A

Virtual Desktop Infrastructure / Virtual Desktop Environment

33
Q

TCP

A

Transmission Control Protocol; allows comps to share resources across a network

34
Q

UDP

A

User Datagram Protocol; like TCP, but used for low latency and loss tolerant programs

35
Q

tracert

A

command used to trace the path of an IP packet

36
Q

ARP

A

Address Resolution Protocol; resolves IP addresses to MAC addresses and stores the results in an ARP cache