Chapter 1 Flashcards

1
Q

The three core goals of cybersecurity

A

CIA
Confidentiality, Integrity, and Availablility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acronyms

PII

A

Personally Identifiable Information

Examples: Medical Information, Credit Card Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key elements of access controls?

A

Identification, Authentication, Authorization

Access controls help protect confidentiality by restricting access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the best way to protect the confidentiality of data?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the 3 core goals of cybersecurity do hashing techniques enforce?

A

Integrity

Ensures that information being sent and received has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to increase Availability

A

Adding fault tolerance and reduncancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Redundancy

A

Adds duplication which allows the service to continue without interruption

Provides fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acronyms

SPOF

A

Single Point of Failure

If a SPOF fails, the entire system can fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronyms

UPS

A

Uninterrupted Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Horizontal scaling

A

Adding additional servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vertical Scaling

A

Adding more resources such as memory or processing power to individual servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acronyms

TCO

A

Total Cost of Ownership

By increasing resiliency of systems, you can avoid higher TCO of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Resiliency

A

The ability of systems to heal themselves or recover from faults with minimal downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk

A

The possibilty of a threat exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

Any circumstance or event that has the potential to compromise CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Incident

A

An adverse event or series of events that can negatively affect the CIA of an organizations IT systems and data

18
Q

Risk Mitigation

A

Reducing a risk’s impact

19
Q

The 4 Security Control Categories

A

Technical, Physical, Manegerial, Operational

20
Q

Security Control Types

A

Preventive, Detective, Corrective, Deterrent, Compensating, Directive

21
Q

Acronyms

IDS and IPS

Types of technical controls

A

Intrusion detection systems and Intrusion Protection Systems

Types of technical controls

22
Q

Examples of Manegerial Controls

Manegerial Controls - documented in written policies

A

Risk assessments, vulnerability assessments

23
Q

Examples of Operational Controls

A

Awareness and training, Configuration management, Media Protection

24
Q

Examples of Preventive Controls

A

Hardening, Training, Security guards, Account disablements process, IPSs

25
Q

Hardening

A

The practice of making a system or application more secure than its default configuration

Includes disabling unnecessary ports and services, keeping system patched, using strong passwords and a robust password policy and disabling default and unnecessary accounts

26
Q

Acronyms

SIEM

A

Security Information and Event Management

Example of detective control

27
Q

What are the Primary Windows Logs?

A

System log, Security log, Application log

Can be viewed with the Windows Event Viewer

28
Q

Acronyms

TOTP

A

Time-based One Time Password

Example of compensating control

29
Q

Acronyms

NTP

A

Network Time Protocol

30
Q

Acronyms

NOC

A

Network Operations Center

31
Q

Where is log information stored in Linux Systems?

A

Text files contained in the /var/log directory

32
Q

Where can you find general system messages on Linux Systems?

A

/var/log/syslog and/or
/var/log/messages

33
Q

What are common sources of network logs?

A

Firewalls, IDSs, IPSs and packet captures

Gives information about network activity

34
Q

What do SIEMs do?

A

Collect, analyze, and correlate logs from multiple sources

35
Q

What is the syslog protocol?

A

Specifies a log entry format and the details on how to transport log entries

You can deploy a centralized syslog server to collect syslog entries from a variety of devices in the network

36
Q

Acronyms

MD5

A

Message Digest 5

A hashing algorithm that creates a fixed-length irriversible output

37
Q

Acronyms

RAID

A

Redundant Arrays of Inexpensive Disks

38
Q

What do RAIDs do?

A

Allow a single disk to fail without losing data

39
Q

Acronyms

NIC

A

Network Interface Card

40
Q

What is NIC teaming?

A

The use of multiple network interface cards so a server remains connected to the network even if one of the cards fails

Provides redundance/ fault tolerance