Chapter 1 Flashcards
A common goal is to remove single points of
Failure
A T_____ is any circumstance or event that has the potential to compromise confidentiality , integrity , or availability .
Threat
A _______ is a weakness . It can be a weakness in the hardware , software , configuration , or users operating the system .
Vulnerability
_______resources typically have elasticity capabilities allowing them to adapt to this increased and decreased demand on the fly .
Cloud
________ controls are alternative controls used when it isn?t feasible or possible to use the primary control .
Compensating
______and______ controls attempt to reverse the impact of an incident or problem after it has occurred . Examples include backups , system recovery plans , and incident handling processes .
Corrective / Recovery
________controls attempt to detect when a vulnerability has been exploited . Examples include log monitoring , security information and event management ( SIEM ) systems , trend analysis , video surveillance systems , and motion detection systems .
Detective
_______controls attempt to prevent incidents by discouraging threats . Examples include locks and guards . Note that these can also be described as preventative controls . The primary difference is that they try to discourage people from trying to exploit a weakness .
Deterrent
_______ is the ability of a system to handle the increased workload by dynamically scaling up or scaling out as the need arises .
Elasticity
______ methods and redundancies are commonly added to support high availability .
Fault Tolerance
Linux ______command displays the beginning of a log file
Head
Linux_____ command displays the end of a log file .
Tail
Linux ______ command adds entries to a log file .
Logger
Linux ______ command , can be used instead of ping because it can use TCP or UDP instead of ICMP .
Hping
Linux_____ can identify open ports on remote systems .
Hping
Linux_____ to view and manipulate the configuration of network interfaces .
Ifconfig
Linux______can enable promiscuous mode on a NIC (Network Interface Card)
Ifconfig
_____ controls are primarily administrative and include items such as risk and vulnerability assessments .
Managerial
_____allows you to view statistics for TCP / IP protocols (view all active network connections) . Suspect malware is causing a computer to connect with a remote computer .
Netstat
_____ is similar to rsyslog and syslog - ng , but it also supports Windows log formats .
Nxlog
_________ controls are focused on the day - to - day operations of an organization . They help ensure an organization is complying with its overall security plan . Some examples include security awareness and training , configuration management , and change management .
Operational
Organizations balance ______ availability with security constraints .
Resource
_________ controls are any controls that you can physically touch . Some examples are bollards and other barricades , access control vestibules ( sometimes called mantraps ) , lighting , fences , and signs .
Physical