CH1 Mastering Security Basics Flashcards

1
Q

True or False:
Confidentiality, integrity, and availability form the CIA security triad, which is a model used to guide an organization’s security principles.

A

True

Page 2822

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the security triad described as?

A

A model used to guide an organization’s security principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the model used to guide an organization’s security principle’s ?

A

Security/CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What factors make up the security triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CIA stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, Integrity, and Availability are factors for what model?

A

Security/CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What describes a goal that an organization wants to achieve?

A

Use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A use case describes what?

A

A goal that an organization wants to achieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a common naming convention for a use case?

A

Verb-noun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example(s) of a well named use case

A

Place order

Login to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What common elements make up a use case?

A
  1. Actors
  2. Precondition
  3. Trigger
  4. Post condition
  5. Normal flow
  6. Alternate flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Match the elements below with their definitions

  1. Alternate flow
  2. Post condition
  3. Precondition
  4. Trigger
  5. Actors
  6. Normal flow

A. Starts the use case
B. Occurs after the process is triggered
C. General steps a process follows
D. Exception steps a process could follow
E. An entity which performs an action
F. Required to be done before so the process can begin

A
1, D
2, B
3, F
4, A
5, E
6, C
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List a few elements of a use case

A
  1. Actors
  2. Precondition
  3. Trigger
  4. Post condition
  5. Normal flow
  6. Alternate flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does confidentiality do?

A

Prevents the unauthorized disclosure of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the prevention of unauthorized disclosure of data known as?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What scrambles data to make it unreadable by unauthorized entities?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does encryption do?

A

Scrambles data to make it unreadable by unauthorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does DES stand for?

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List three access control elements

A
  1. Identification
  2. Authentication
  3. Authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is identification?

A

Unique attributes that make up an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Authentication?

A

The process of determining if an entity is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Authorization?

A

The process of determining what permission an entity has for data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Match the term to the meaning

  1. Identification
  2. Authorization
  3. Authentication

A. The process of determining what permission an entity has for data and systems
B. The unique attributes that make up an entity
C. The process of determining if an entity is who they claim to be

A

1, B
2, A
3, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Access controls are used to ______ and ______ access

A. Prevent, Protect
B. Grant, Restrict
C. Prime, Lock
D. Test, Break

A

B. Grant, Restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the best way to protect data confidentiality?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Choose all answers that are true

Encryption is ____

A. The act of scrambling data to be unreadable to unauthorized users
B. Not used to secure data
C. The best way to protect data confidentiality
D. A protocol only used by hackers

A

A. The act of scrambling data to be unreadable to unauthorized users
and
C. The best way to protect data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What helps to protect confidentiality?

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

______ provides assurance that data has not changed

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does integrity provide assurance of?

A

That data has not changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Integrity provides assurance that _____ has not ____

A

Data has not changed

32
Q

What causes a loss of integrity?

A. Unauthorized change to data
B. Unintended changes
C. System errors
D. All of the above

A

D. All of the above

33
Q

List a technique which enforces integrity

A

Hashing

34
Q

Hashing is a technique which enforces _____

A

Integrity

35
Q

What does SHA stand for with respect to data integrity?

A. Secure Hashing Access
B. Secure Hashing Ability
C. Secure Hashing Availability
D. Secure Hashing Algorithm

A

D. Secure Hashing Algorithm

36
Q

What does a hashing algorithm do?

A. Generates a variable length of reversible output
B. Encrypts data using a key
C. Creates a fixed length of irreversible output
D. Obfuscates data

A

C. Creates a fixed length of irreversible output

37
Q

How does a hashing algorithm ensure integrity?

A. It doesn’t
B. Comparing hash outputs on the same data during different times. If they match the data has not changed.

A

B.

38
Q

True or False:

Hashes identify what has changed in data

A

False

It can only generate output used for comparison. It does not indicate what differences exist

39
Q

What are some ways hashing is used to ensure data integrity?

A. Sending/Receiving e-mail
B. Downloading files
C. Uploading files
D. Migrating data

A

A. Sending/Receiving e-mail
and
B. Downloading files

40
Q

True or False

Availability means data and services are available when needed.

A

True

41
Q

What is used to ensure high levels of availability in organizations?

A. Fault tolerance
B. Encryption
C. Redundancy
D. Hashing

A

A. Fault tolerance

C. Redundancy

42
Q

Fault tolerance and ______ are used to ensure high levels of availability

A

Redundancy

43
Q

Redundancy and _____ _____ are used to ensure high levels of availability

A

Fault tolerance

44
Q

Redundancy adds ____ to critical systems

A. Decoupling
B. Complexity
C. Duplication
D. Encryption

A

C. Duplication

45
Q

Duplication is added to critical systems for

A. Reversal
B. Removal
C. Regression
D. Redundancy

A

D. Redundancy

46
Q

Fault tolerance is the ability to

A. Prevent disruption in service
B. Manage large loads of data
C. Segregate roles and responsibilities
D. Remove malicious software

A

A. Prevent disruption in service

47
Q

A goal of redundancy and fault tolerance is to remove:

A. Worms
B. Viruses
C. Single Points of Failure
D. Spyware

A

C. Single points of failure

48
Q

What does SPOF stand for?

A

Single points of failure

49
Q

True or False

An SPOF is a failure that causes an entire system failure

A

True

50
Q

An SPOF is a failure that causes

A. Minimal outages
B. Intermittent system failure
C. Entire system failure
D. Partial system failure

A

C. Entire system failure

51
Q

Match the fault tolerance and redundancy methods with their definitions

  1. Disk redundancies
  2. Server redundancies
  3. Network redundancies
  4. Power redundancies

A. Multiple communication paths
B. Multiple servers
C. Multiple disks
D. Multiple power sources

A

1, C
2, B
3, A
4, D

52
Q

RAID-1, RAID-5, RAID-10, and backups are configurations of which fault tolerance and redundancy method?

A. Disk redundancies
B. Server redundancies
C. Network redundancies
D. Power redundancies

A

A. Disk redundancies

53
Q

Failover clusters are configurations of which fault tolerance and redundancy method?

A. Disk redundancies
B. Server redundancies
C. Network redundancies
D. Power redundancies

A

B. Server redundancies

54
Q

Load balancing and network interface card teaming are configurations of which fault tolerance and redundancy method?

A. Disk redundancies
B. Server redundancies
C. Network redundancies
D. Power redundancies

A

C. Network redundancies

55
Q

Uninterruptible power supplies and power generators are examples of which fault tolerance and redundancy method?

A. Disk redundancies
B. Server redundancies
C. Network redundancies
D. Power redundancies

A

D. Power redundancies

56
Q

Scalability and elasticity contribute to ____ ____

A. Low availability
B. Intermittent availability
C. High availability
D. Remote availability

A

C. High availability

57
Q

The difference between scalability and elasticity is

A. Scalability is for static configurations and elasticity is for dynamic configurations
B. The amount of hardware required
C. The amount of software required
D. The amount of cost

A

A. Scalability is for static configurations and elasticity is for dynamic configurations

58
Q

Scaling up/out ____ resources. Scaling down/in_____ resources

A

Increases, decreases

59
Q

Cloud resources typically have _____ capability

A. Static
B. Dormant
C. Elastic
D. Diverse

A

C. Elastic

60
Q

Another method of ensuring availability is

A. Encrypting
B. Hashing
C. Authenticating
D. Patching

A

D. Patching

61
Q

______ helps systems heal themselves and recover from faults with minimal downtime

A

Resiliency

62
Q

True or False

Resiliency methods are similar to high availability methods of redundancy and fault tolerance

A

True

63
Q

Resiliency incorporates _______ failed sequences

A

Retrying

64
Q

Organizations frequently need to balance resources with _______

A. Data integrity
B. Scalability
C. Security constraints
D. Redundancy

A

C. Security constraints

65
Q

Why is there a need to balance resources and security constraints?

A. Costs
B. Time
C. Availability
D. Confidentiality

A

A. Costs

To implement highest security constraints can be costly and are result in a company not being profitable

66
Q

_____ is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.

A. Resources
B. Redundancy
C. Reputation
D. Risk

A

D. Risk

67
Q

Risk is

A. When there are no threats to an exploited vulnerability
B. When all systems are operational with no issues
C. The basics of security
D. When there is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss

A

D. When there is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss

68
Q

A ______ is a weakness.

A

Vulnerability

69
Q

A vulnerability is known as a ______ in security

A

Weakness

70
Q

A ________ is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.

A

Security incident

71
Q

True or False

A security incident is an adverse event or series of events that can negativity affect the confidentiality, integrity or availability of an organization’s information technology (IT) systems and data

A

True

72
Q

A security event can include which of the following:

A. Intentional attacks
B. Malicious software (malware) infections
C. Accidental data loss
D. All of the above

A

D. All of the above

73
Q

_________ reduces the chances that a threat will exploit a vulnerability.

A

Risk mitigation

74
Q

Risk mitigation

A. increases the chances that a threat will exploit a vulnerability.
B. has no impact on the chances that a threat will exploit a vulnerability.
C. reduces the chances that a threat will exploit a vulnerability.
D. All of the above

A

C. reduces the chances that a threat will exploit a vulnerability.

75
Q

What is used to reduce risk?

A. Containers
B. Constants
C. Controls
D. Contents

A

C. Controls

76
Q

True or False

You can’t prevent most threats

A

True

77
Q

True or False

You can only reduce the risk of threats

A

True