Chapter 1 Flashcards

Domain 1 and 3

1
Q

What are the three (3) common types of security evaluation?

A

Risk Assessment, Vulnerability Assessment, and Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a risk assessment?

A

A process of identifying assets, threats, and vulnerabilities and then using that information to calculate risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is is vulnerability assessment?

A

A procedure that uses automated tools to locate known security weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a penetration test?

A

A procedure using trusted individuals to stress-test the security infrastructure to find issues that may not have been discovered by other assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the primary goals and objectives for a security infrastructure?

A

Confidentiality, Integrity, and Availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the security CIA Triad - what is confidentiality?

A

The concept of ensuring secrecy of data, objects and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which basic security principle is confidentiality based upon?

A

Least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the goal of confidentiality?

A

To prevent or minimize unauthorized “read” access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the corner stone of security concepts?

A

Confidentiality, Integrity, and Availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the opposite of Confidentiality, Integrity, and Availability (CIA)?

A

Disclosure, Alteration and Destruction (DAD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the concepts, conditions and aspects of confidentiality

A

Sensitivity, Discretion, Criticality, Concealment, Secrecy, Privacy, Seclusion, and Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is sensitivity in the concept of confidentiality?

A

The level of damage that could be caused if the information was released without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is discretion in the concept of confidentiality?

A

The act of the data owner or operator that influences or controls the disclosure of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is criticality in the concept of confidentiality?

A

The level of to which the information is importance to the organization for continuing operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is concealment in the concept of confidentiality?

A

The act of hiding the information to prevent unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is secrecy in the concept of confidentiality?

A

The act of keeping data or information secret or preventing its disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is privacy in the concept of confidentiality?

A

The act of keeping personally identifiable information confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is seclusion in the concept of confidentiality?

A

Involves storing data or information in a location that is out of the way of unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is isolation in the concept of confidentiality?

A

The act of keeping something separated from others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In relation to the security CIA triad, what is integrity?

A

The concept of protecting the reliability and correctness of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In practice, how does integrity protect the data?

A

Preventing unauthorized modifications, preventing mistakes by authorized users, and maintaining consistency and verifiability of the data

22
Q

What are the concepts, conditions and aspects of integrity?

A

Accuracy, truthfulness, validity, accountability, responsibility, completeness, comprehensiveness

23
Q

In relation to the security CIA triad, what is avilability?

A

The timely and uninterrupted access to data by authorized users.

24
Q

What are the concepts, conditions and aspects of availability?

A

Usability, accessibility, and timeliness

25
What is authenticity?
The security concept that the data is authentic and genuine and originates from its alleged source.
26
What is non-repudiation?
The concept that which ever subject caused and event or modification to data cannot successfully deny tha the event or change took place.
27
Within the framework of AAA services, what is identification?
A claim that the subject is who or what is say it is.
28
Within the framework of AAA services, what is authentication?
Verification or proof that the subject is who or what it claims to be.
29
Within the framework of AAA services, what is authorization?
Permission from the system to access data in question.
30
Within the framework of AAA services, what is auditing?
The means by which a subjects actions are tracked once authorization is granted.
31
Explain "defense in depth"?
The laying of security controls such that breaching once layer may not fully expose the data.
32
Explain the use of abstraction in the concept of security?
The practice of placing data or assets in to groups, classes, or roles to further protect the data.
33
What is a security boundary?
A line or intersection between two areas that having different security requirements.
34
What is third-party governance?
A system of external oversight that may be mandated by law, regulation, industry standards, contractural obligation or licensing demands.
35
What is a security policy?
The highest level tier of formal document that defines the scope or security needed by the organization and a breakdown of assets that require protection. Security policies are mandatory and high level.
36
What is a security procedure?
A detailed set of steps that document and describe exactly how to implement a specific securoty mechanism, control, or solution.
37
What is a standard?
Standards describe the specific use of a technology and are mandatory to follow.
38
What are guidelines?
Recommendations on the use or implementation of a particular solution; ie password length, or the use of certain characters.
39
What is due care?
The care a "reasonable person" would exercise under a given set of circumstances.
40
What is due diligence?
The preemptive measures made to avoid harm.
41
What is threat modeling?
A process performed where potential threats are identified, classified, and analyzed.
42
What is governance?
The process of ensuring that the organization focuses on the core activities and clarifying subject that have authority to make decisions.
43
What is risk management?
The systematic process of identifying, analyzing, evaluating, remediating, and monitoring rissk.
44
What is security governance?
The collections. of practices related to supporting, defining and directing the security efforts of an organization.
45
What is compliance?
The actions taken to ensure behavior complies with established rules and policies.
46
What is a strategic plan?
A long-term plan to guide the organization in its security efforts that is fairly stable.
47
What is a tactical plan?
A mid-term plan developed to provide more details on accomplishing the goals and objectives in tyeh strategic plan.
48
What is an operational plan?
A short-term plan that is highly detailed and used for implementing the strategic and tactical plans.
49
What is the time frame for a strategic plan?
About 5-years and is maintained annually.
50
What is the typical time frame for a tactical plan?
About one-year.
51
How often is an operational plan normally updated?
Either monthly or quarterly