Chapter 1: Mastering Security Basics Flashcards

1
Q

A use case

A

helps professionals identify and clarify requirements to achieve a goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality ensures

A

that data is only viewable by authorized users. Encryption is the best choice to provide confidentiality. Access controls also protect the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Steganography

A

(hiding data inside other data) is one method of supporting obfuscation by making the hidden data harder to see.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

provides assurances that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes. Data can be a message, a file, or data within a database. Hashing is a common method of ensuring integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

prevents entities from denying they took an action. Digital signatures and audit logs provide non-repudiation. Digital signatures also provide integrity for files and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

ensures that data and services are available when needed. A common goal is to remove single points of failure. Methods used to increase or maintain availability include fault tolerance, failover clusters, load balancing, backups, virtualization, HVAC systems, and generators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk

A

the possibility of a threat exploiting a vulnerability and resulting in a loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A threat

A

is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A vulnerability

A

is a weakness. It can be a weakness in the hardware, software, configuration, or users operating the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk mitigation

A

reduces risk by reducing the chances that a threat will exploit a vulnerability or by reducing the impact of the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security controls

A

reduce risks. For example, antivirus software is a security control that reduces the risk of virus infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The three primary security control types are

A

technical (implemented with technology), administrative (using administrative or management methods), and physical (using controls that you can physically touch).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technical control is

A

one that uses technology to reduce vulnerabilities. Encryption, antivirus software, IDSs, firewalls, and the principle of least privilege are technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Administrative controls are

A

primarily administrative and include items such as risk and vulnerability assessments. Some administrative controls help ensure that day-to-day operations of an organization comply with their overall security plan. Some examples include security awareness and training, configuration management, and change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preventive controls

A

attempt to prevent security incidents. Examples include system hardening, user training, guards, change management, and account disablement policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detective controls

A

attempt to detect when a vulnerability has been exploited. Examples include log monitoring, trend analysis, security audits (such as a periodic review of user rights), video surveillance systems, and motion detection systems.

17
Q

Corrective controls

A

attempt to reverse the impact of an incident or problem after it has occurred. Examples include intrusion prevention systems (IPSs), backups, and system recovery plans.

18
Q

Deterrent controls

A

attempt to prevent incidents by discouraging threats.

19
Q

Compensating controls

A

are alternative controls used when it isn’t feasible or possible to use the primary control.

20
Q

Virtualization

A

allows multiple servers to operate on a single physical host. They provide increased availability with various tools such as snapshots and easy restoration.

21
Q

Type I hypervisors

A

run directly on the system hardware. They are often called bare-metal hypervisors because they don’t need to run within an operating system.

22
Q

Type II hypervisors

A

run as software within a host operating system.

23
Q

Container virtualization

A

is a specialized version of a Type II hypervisor. It allows services or applications to run within their own isolated cells or containers. Containers don’t have a full operating system but instead use the kernel of the host.

24
Q

Snapshots

A

capture the state of a VM at a moment in time. Administrators often take a snapshot before performing a risky operation. If necessary, they can revert the VM to the snapshot state.

25
Q

VM sprawl

A

can occur if personnel within the organization don’t manage the VMs.

26
Q

VM escape attacks

A

allow an attacker to access the host system from the VM. The primary protection is to keep the host and guests up to date with current patches.

27
Q

You run command-line tools in

A

the Command Prompt window (in Windows) and the terminal (in Linux).

28
Q

The ping command can be used to

A

check connectivity; check name resolution; and verify that routers, firewalls, and intrusion prevention systems block ICMP.

29
Q

The ipconfig command on Windows allows you to

A

view the configuration of network interfaces.

30
Q

Linux uses ifconfig and/or ip to

A

view and manipulate the configuration of network interfaces. You can enable promiscuous mode on a NIC with ifconfig.

31
Q

Netstat allows you to

A

view statistics for TCP/IP protocols and view all active network connections. This can be useful if you suspect malware is causing a computer to connect with a remote computer.

32
Q

Tracert

A

lists the routers (also called hops) between two systems. It can be used to verify a path has not changed.

33
Q

The arp command allows you to

A

view and manipulate the ARP cache. This can be useful if you suspect a system’s ARP cache has been modified during an attack.