Chapter 1 Flashcards

1
Q

A response to risk that acknowledges the risk but takes no steps to address it.

A

accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security controls for developing and ensuring that policies and procedures are carried out; regulating the human factors of security.

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A new class of attack that uses innovative attack tools to infect a system and then silently extracts data over a an extended period.

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Deficiencies in software due to poor. design

A

architecture/design weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an item that has value.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristic features of different groups of threat actors.

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security actions that ensure that data is accessible to authorized users.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A response to risk that identifies the risk and the decision is made to not engage in the risk-provoking activity.

A

avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat actors that launch attack against an opponents’ system to steal classified information.

A

competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the highest data label level of sensitivity.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

having different groups responsible for regulating access to a system.

A

control diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the out-of-the-box security config settings

A

default config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Creating multiple layers of security defenses through which an attacker must penetrate; also called layered security.

A

defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

system for which vendors have dropped all support for security updates due to the system’s age.

A

end-of-life system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the location outside an enterprise in which some threat actors perform.

A

external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an attribute of threat actors that can vary widely.

A

funding and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a group of threat actors that is strongly motivated by ideology

A

hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

software that does not properly trap an error condition and provides an attacker with underlying access to the system.

A

improper error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.

A

improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

account set up for a user that might provide more access than is necessary.

A

improperly config accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Frameworks/architectures that are specific to a particular industry or market sector.

A

industry-specific frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

“support structures” for implementing security; also called reference architectures

A

industry-standard frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

employees, contractors, and business partners who can be responsible for an attack.

A

insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

A

integrity

25
Q

the reasoning behind attacks made by threat actors.

A

intent and motivation

26
Q

the location within an enterprise in which some threat actors perform.

A

internal

27
Q

information security framework/architectures that are worldwide.

A

international

28
Q

when a company that made a device provides no support for the device.

A

lack of vendor support

29
Q

creating multiple layers of security defenses through which an attacker must penetrate; also called defense-in-depth.

A

layered security

30
Q

an incorrectly configured device.

A

misconfig

31
Q

addressing risks by making risks less serious.

A

mitigate

32
Q

state-sponsored attackers employed by a government for launching computer attacks against foes.

A

nation state actors

33
Q

information security framework/architectures that are domestic.

A

national

34
Q

a threat that has not been previously identified.

A

new threat

35
Q

information security frameworks/architectures that are not required.

A

non-regulatory

36
Q

freely available automated attack software.

A

open-source intel

37
Q

threat actors that are moving from traditional organized criminal activities to more rewarding and less risky online attacks.

A

organized crime

38
Q

A software occurrence when two concurrent threads of execution access a shared resources simultaneously, resulting in unintended consequences.

A

race condition

39
Q

“supporting structures” for implementing security; also called industry-standard frameworks.

A

reference architectures

40
Q

information security frameworks/architectures that are required by agencies that regulate the industry.

A

regulatory

41
Q

a situation in which a hardware device with limited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended.

A

resource exhaustion

42
Q

a situation that involves exposure to danger.

A

risk

43
Q

different options available when dealing with risks.

A

risk response techniques

44
Q

individual who lacks advanced knowledge of computers and networks and so uses downloaded automated attack software to attack information systems.

A

script kiddies

45
Q

threat actors that have developed a high degree of complexity.

A

sophisticated

46
Q

the widespread proliferation of devices across an enterprise.

A

system sprawl

47
Q

using technology that is carried out or managed by devices as a basis for controlling the access to and usage of sensitive data.

A

technical controls

48
Q

a type of action that has the potential to cause harm.

A

threat

49
Q

a person or element that has the power to carry out a threat.

A

threat actor

50
Q

a response to risk that allows a third party to assume the responsibility of the risk.

A

transfer

51
Q

devices that are not formally identified or documented in an enterprise.

A

undocumented assets

52
Q

users with little or no instruction in making security decisions.

A

untrained users

53
Q

instructing employees as to the security reasons behind security restrictions.

A

user training

54
Q

using security products provided by different manufactures.

A

vendor diversity

55
Q

a flaw or weakness that allows a threat agent to bypass security.

A

vulnerability

56
Q

a situation in which an attacker manipulates commonplace actions that are routinely performed; also called business process compromise.

A

vulnerable business processes

57
Q

configuration options that provide limited security choices.

A

weak config

58
Q

an attack in which there are no days of warning.

A

zero day