Chapter 1 Concepts Flashcards

To understand concepts covered in Security+ book

1
Q

Confidentiality

A

Confidentiality ensures that data is only viewable by authorized users. The best way to protect the confidentiality of data is to encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steganography

A

Steganography is the process of hiding data within data. Such as hiding a text document within an image file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Integrity provides assurances that data has not changed. This includes ensuring that data has not been modified, tampered with, or corrupted. Loss of integrity indicates the data is different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Availability indicates that data and services are available when needed. Organizations commonly implement redundancy and fault-tolerance to ensure high levels of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Redundancy

A

Redundancy adds duplication to critical systems and provides fault tolerance. If a critical component has a fault, the duplication provided by the redundancy allows the service to continue without interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fault Tolerance

A

A goal of fault tolerance is to remove each single point of failure. A system with fault tolerance can suffer a fault but it can tolerate it and continue to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk

A

Risk is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat

A

A threat is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability

A

A vulnerability is a weakness in hardware, software, configuration, or even users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Incident

A

A security incident is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s IT systems and data. This includes intentional attacks, malicious software (malware) infections, accidental data loss, and much more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Mitigation

A

Risk mitigation reduces the chances that a threat will exploit a vulnerability, or reduces the impact of the risk, by implementing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Controls

A

Security controls are used to mitigate risk and include technical, administrative, physical, preventive, detective, corrective, deterrent, and compensating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technical Controls

A

Technical controls use technology to reduce vulnerabilities. Some examples include encryption, anti-virus software, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Administrative Controls

A

Administrative controls use methods mandated by organizational policies or other guidelines. These include awareness and training, configuration and change management, and contingency planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical Controls

A

Physical controls are controls that you can physically touch. Some examples include lighting, signs, fences, and security guards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Preventive Controls

A

Preventive controls seek to proactively prevent or stop security incidents from happening. Some examples include hardening systems, security awareness and training, security guards, and account disablement policy.

17
Q

Detective Controls

A

Detective controls attempt to detect when vulnerabilities have been exploited, resulting in a security incident. Detective controls discover the event AFTER it’s occurred. Some examples include log monitoring, trend analysis, security audits, video surveillance, and motion detection.

18
Q

Corrective Controls

A

Corrective controls attempt to reverse the impact of an incident or problem after it has occurred. Some examples include intrusion prevention systems (IPS), backups and system recovery.

19
Q

Deterrent Controls

A

Deterrent controls attempt to discourage a threat. Some deterrent controls attempt to discourage potential attackers from attacking, and others attempt to discourage employees from violating a security policy. Some physical security deterrents include cable locks, and hardware locks.

20
Q

Compensating Controls

A

Compensating controls are alternative controls used instead of a primary control. If an employee can’t get an ID card, the organization might issue them a time-based one-time password

21
Q

netstat

A

The netstat command (network statistics) allows you to view statistics for TCP/IP protocols on a system. It also gives you the flexibility to view active TCP/IP network connections.

22
Q

tracert

A

The tracert command lists the routers between two systems. Tracert identifies the IP address and sometimes the host name of each hop in addition to the round-trip times (RTTs) for each hop. Can be used to identify faulty routers on the network.