Chapter 1 Flashcards

1
Q

The three core goals of cybersecurity

A

CIA
Confidentiality, Integrity, and Availablility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acronyms

PII

A

Personally Identifiable Information

Examples: Medical Information, Credit Card Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key elements of access controls?

A

Identification, Authentication, Authorization

Access controls help protect confidentiality by restricting access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the best way to protect the confidentiality of data?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the 3 core goals of cybersecurity do hashing techniques enforce?

A

Integrity

Ensures that information being sent and received has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways to increase Availability

A

Adding fault tolerance and reduncancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Redundancy

A

Adds duplication which allows the service to continue without interruption

Provides fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acronyms

SPOF

A

Single Point of Failure

If a SPOF fails, the entire system can fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Acronyms

UPS

A

Uninterrupted Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Horizontal scaling

A

Adding additional servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vertical Scaling

A

Adding more resources such as memory or processing power to individual servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Acronyms

TCO

A

Total Cost of Ownership

By increasing resiliency of systems, you can avoid higher TCO of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Resiliency

A

The ability of systems to heal themselves or recover from faults with minimal downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk

A

The possibilty of a threat exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

Any circumstance or event that has the potential to compromise CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Security Incident

A

An adverse event or series of events that can negatively affect the CIA of an organizations IT systems and data

18
Q

Risk Mitigation

A

Reducing a risk’s impact

19
Q

The 4 Security Control Categories

A

Technical, Physical, Manegerial, Operational

20
Q

Security Control Types

A

Preventive, Detective, Corrective, Deterrent, Compensating, Directive

21
Q

Acronyms

IDS and IPS

Types of technical controls

A

Intrusion detection systems and Intrusion Protection Systems

Types of technical controls

22
Q

Examples of Manegerial Controls

Manegerial Controls - documented in written policies

A

Risk assessments, vulnerability assessments

23
Q

Examples of Operational Controls

A

Awareness and training, Configuration management, Media Protection

24
Q

Examples of Preventive Controls

A

Hardening, Training, Security guards, Account disablements process, IPSs

25
Hardening
The practice of making a system or application more secure than its default configuration ## Footnote Includes disabling unnecessary ports and services, keeping system patched, using strong passwords and a robust password policy and disabling default and unnecessary accounts
26
# Acronyms SIEM
Security Information and Event Management | Example of detective control
27
What are the Primary Windows Logs?
System log, Security log, Application log | Can be viewed with the Windows Event Viewer
28
# Acronyms TOTP
Time-based One Time Password | Example of compensating control
29
# Acronyms NTP
Network Time Protocol
30
# Acronyms NOC
Network Operations Center
31
Where is log information stored in Linux Systems?
Text files contained in the /var/log directory
32
Where can you find general system messages on Linux Systems?
**/var/log/syslog** and/or **/var/log/messages**
33
What are common sources of network logs?
Firewalls, IDSs, IPSs and packet captures | Gives information about network activity
34
What do SIEMs do?
Collect, analyze, and correlate logs from multiple sources
35
# [](http://) What is the syslog protocol?
Specifies a log entry format and the details on how to transport log entries ## Footnote You can deploy a centralized syslog server to collect syslog entries from a variety of devices in the network
36
# Acronyms MD5
Message Digest 5 ## Footnote A hashing algorithm that creates a fixed-length irriversible output
37
# Acronyms RAID
Redundant Arrays of Inexpensive Disks
38
What do RAIDs do?
Allow a single disk to fail without losing data
39
# Acronyms NIC
Network Interface Card
40
What is NIC teaming?
The use of multiple network interface cards so a server remains connected to the network even if one of the cards fails ## Footnote Provides redundance/ fault tolerance