Chapter 1 Flashcards

1
Q

A common goal is to remove single points of

A

Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A T_____ is any circumstance or event that has the potential to compromise confidentiality , integrity , or availability .

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _______ is a weakness . It can be a weakness in the hardware , software , configuration , or users operating the system .

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______resources typically have elasticity capabilities allowing them to adapt to this increased and decreased demand on the fly .

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ controls are alternative controls used when it isn?t feasible or possible to use the primary control .

A

Compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______and______ controls attempt to reverse the impact of an incident or problem after it has occurred . Examples include backups , system recovery plans , and incident handling processes .

A

Corrective / Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________controls attempt to detect when a vulnerability has been exploited . Examples include log monitoring , security information and event management ( SIEM ) systems , trend analysis , video surveillance systems , and motion detection systems .

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______controls attempt to prevent incidents by discouraging threats . Examples include locks and guards . Note that these can also be described as preventative controls . The primary difference is that they try to discourage people from trying to exploit a weakness .

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ is the ability of a system to handle the increased workload by dynamically scaling up or scaling out as the need arises .

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

______ methods and redundancies are commonly added to support high availability .

A

Fault Tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Linux ______command displays the beginning of a log file

A

Head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Linux_____ command displays the end of a log file .

A

Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Linux ______ command adds entries to a log file .

A

Logger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Linux ______ command , can be used instead of ping because it can use TCP or UDP instead of ICMP .

A

Hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Linux_____ can identify open ports on remote systems .

A

Hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Linux_____ to view and manipulate the configuration of network interfaces .

A

Ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Linux______can enable promiscuous mode on a NIC (Network Interface Card)

A

Ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____ controls are primarily administrative and include items such as risk and vulnerability assessments .

A

Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____allows you to view statistics for TCP / IP protocols (view all active network connections) . Suspect malware is causing a computer to connect with a remote computer .

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ is similar to rsyslog and syslog - ng , but it also supports Windows log formats .

A

Nxlog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_________ controls are focused on the day - to - day operations of an organization . They help ensure an organization is complying with its overall security plan . Some examples include security awareness and training , configuration management , and change management .

A

Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Organizations balance ______ availability with security constraints .

A

Resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_________ controls are any controls that you can physically touch . Some examples are bollards and other barricades , access control vestibules ( sometimes called mantraps ) , lighting , fences , and signs .

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_______ controls attempt to prevent security incidents . Examples include system hardening , user training , guards , change management , and account disablement policies .

A

Preventative

25
Q

________ methods help systems heal themselves or recover from faults with minimal downtime .

A

Resiliency

26
Q

_______ controls , or incident response controls , help an organization prepare for security incidents and respond to them when they occur .

A

Response

27
Q

__ is the possibility of a threat exploiting a vulnerability and resulting in a loss .

A

Risk

28
Q

____ mitigation reduces risk by reducing the chances that a threat will exploit a vulnerability or reduce the risk?s impact .

A

Risk

29
Q

____came out after syslog - ng and includes the ability to send log entries directly into database engines .

A

Rsyslog

30
Q

______ is the ability of a system to handle increased workload either by scaling up or by scaling out . This is done manually by administrators .

A

Scalability

31
Q

__controls reduce risks . For example , antivirus software is a security control that reduces the risk of virus infection .

A

Security

32
Q

____systems provide a centralized solution for collecting , analyzing , and managing data from multiple sources .

A

Security Information And Event Management ( Siem )

33
Q

Security professionals may want to apply security controls everywhere without considering the cost . However , executives have a responsibility to minimize costs without sacrificing ______ .

A

Security

34
Q

_______extends syslogd , allowing a system to collect logs from any source .

A

Syslog - Ng

35
Q

Systems scale out by adding additional ______ .

A

Nodes Or Servers

36
Q

Systems____ by adding additional hardware resources such as memory , processing power , bandwidth capability , and / or drive space .

A

Scale Up

37
Q

_______ controls use technology to reduce vulnerabilities .

A

Technical

38
Q

Encryption , antivirus software , IDSs , firewalls , and the principle of least privilege are________controls .

A

Technical Controls .

39
Q

The ____ command allows you to view and manipulate the _____ cache . This can be useful if you suspect a system?s _____ cache has been modified during an attack .

A

Arp

40
Q

_____ shows content of address resolution protocol and is used to link IP AND MC ADDRESS

A

Arp

41
Q

The ____ command ( short for concatenate ) displays the contents of files .

A

Cat

42
Q

The _____ command searches for a specific string or pattern of text within a file (simplifies search when a log is long).

A

Grep

43
Q

GREP stands for______

A

Global Regular Expression Print

44
Q

The _____ command on Windows allows you to view the configuration of network interfaces .

A

Ipconfig

45
Q

The command displays log entries from several different sources on Linux systems .

A

Journalctl

46
Q

The ___ command can be used to check connectivity ; check name resolution ; and verify that routers , firewalls , and intrusion prevention systems block ping traffic .

A

Ping

47
Q

The Linux______command collects entries from a variety of devices in the network , similar to how a SIEM server collects log entries .

A

Syslog

48
Q

The ______ on Linux systems collects and routes syslog entries .

A

Syslog Daemon ( Syslogd )

49
Q

The three primary security control categories are ______, _______ and _______.

A

Managerial , Operational , And Technical .

50
Q

____ ( on Windows systems ) lists the routers ( also called hops ) between two systems . It can verify a path has not changed.

A

Tracert

51
Q

____(on Linux systems) lists the routers ( also called hops ) between two systems . It can verify a path has not changed.

A

Traceroute

52
Q

Windows includes several logs that you can view with the Windows Event Viewer. The____log functions as a security log , an audit log , and an access log.

A

Security

53
Q

Windows includes several logs that you can view with the Windows Event Viewer. Windows records events related to the operating system in the ______ log

A

System

54
Q

Windows includes several logs that you can view with the Windows Event Viewer. Applications record events in the _______ log

A

Application

55
Q

You run command line tools in the ______ Prompt window ( in Windows ).

A

Command

56
Q

You run command line tools in the ______ ( in Linux ) .

A

Terminal

57
Q

You use the ______ ( short for change mode ) command to change permissions on files .

A

Chmod

58
Q

SIEM stands for________________________

A

Security Info Event Management