Chapter 1 Defending Against Cybersecurity Threats Flashcards

1
Q

Weakness in a device, system, application or process that might allow an attack to take place.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • A force outside an organization that may exploit a vulnerability.
  • Malicious i.e. hacker
  • Non-malicious i.e. earthquake
A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • The relationship between threats and vulnerabilities

- If one of these don’t exist then this definition doesn’t either

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Framework that outlines the risk assessment process that suggests an organization should identify threats and vulnerabilities and use this info to determine the level of risk posed by the combination or of these threats and vulnerabilities.

A

NIST SP 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • NAC solution that use dedicated appliances that sit in between devices and the resources they wish to access.
  • Solution typical in hotels
A

In-Band NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • NAC solution that leverages existing network infrastructure
  • i.e. 802.1X
A

Out-of-Band NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Checks the characteristics of each packet against firewall rules without additional intelligence

A

Packet filtering firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Maintains info about each state of each connection passing through the firewall

A

Stateful Inspection firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Ensures that there are not unauthorized modifications to info or systems, either internationally or unintentionally
  • i.e. hashing and integrity monitoring solutions
A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Ensures that info and systems are ready to meet the needs of legitimate users at the time those users request them.
  • i.e. fault tolerance, clustering and backups
A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Under step 2: Conduct Assessment task Identify Threats NIST SP 800-300
  • Represents individuals, groups, and organizations that are attempting to undermine security of organization
A

Adversarial Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
  • Represents individuals doing their routine work and mistakenly performs an action that undermines security
A

Accidental Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
  • Represents equipment, software, or environmental controls that fail due to exhaustion of resources, exceeding operational capacity, or failing due to age.
A

Structural Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
  • Represents natural to man-made disasters occurring
A

Environmental Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls put into place for systems, devices, software, and settings that work to enforce CIA.

A

Technical Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls put into place that use practices and procedures to bolster security

A

Operational Controls

17
Q

Firewalls designed to protect against web attacks

A

Web App Firewalls (WAF)

18
Q
  • In 802.1x this device cannot validate the user itself, it instead passes requests along to authentication server using RADIUS.
  • Runs on WAP or switch
A

Authentication

19
Q

In 802.1x refers to endpoint device

A

Supplicant

20
Q

In 802.1x server that validates user access on a network

A

Authentication Server

21
Q

Attacker sends a suspicious request to the DNS server. Server in turns feeds false DNS info to the attacker

A

DNS Sinkholes

22
Q

Firewall that incorporates more info into their decision-making process, i.e. users, apps, business processes.

A

Next-gen Firewalls

23
Q

NIST divides a pen test into what phases?

A
  1. Planning
  2. Discovery
  3. Attack
  4. Reporting
24
Q

According to the NIST in the Planning phase. What are some rules of engagement?

A

Timing - When will test the take place?
Scope - What is on and off-limits?
Authorization - Who is authorizing the pen-test at the org?

25
Q
  • Ensures that unauthorized individuals are are not able to gain access to sensitive info.
  • i.e. firewalls , ACLs, and encryption
A

Confidentiality

26
Q

What are the 4 steps of a risk assessment per NIST SP 800-30

A

Step 1: Prepare for Assessment
Step 2: Conduct Assessment
Step 3: Communicate Results
Step 4: Maintain Assessment

27
Q

According to Step 2: Conduct Assessment list some tasks included in this section

A
  • Identify Threat sources and events
  • Identify Vulnerabilities and predisposing conditions
  • Determine Likelihood of occurrence
  • Determine Magnitude of impact
  • Determine Risk