Chapter 1 - Networking Security Concepts Flashcards

1
Q

Which security term refers to a person, property, or data of value to a company

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which asset characteristic refers to risk that results from a threat and lack of a countermeasure?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three items are the primary network security objectives for a company?

A
  • Confidentiality
  • Integrity
  • Availablity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of a physical control?

A

Electronic Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary motivation for most attacks against networks today?

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of an attack involves lying about the source address of a frame or packet?

A

Spoofing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two approaches to security provide the most secure results on day one?

A
  • Defense in Depth
  • Least Privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following might you find in a network that is based on a defense-in-depth security implementation?

A
  • Firewall
  • IPS (Intrusion Prevention System)
  • Access Lists
  • Current Patches on Servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In relation to production networks, what are viable options when dealing with risk?

A
  • Transfer it
  • Mitigate it
  • Remove it

(NOT ignore it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Asset?

A

It is anything valuable to an organization. (computers, people, intellectual propery, contact lists, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a vulnerability?

A

it is an exploitable weakness in a system or its design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a threat?

A

A threat is any potential danger to an asset.

Latent” threats are not yet realized. An active attack launched on an organization is “realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a countermeasure?

A

A countermeasure is a safeguard that somehow mitigates a potential risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When it comes to network security, what is risk?

A

Risk is the potential for unauthorized access to, compromise, destruction, or damage to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Administrative Countermeasure?

A

These are things like written policies, procedures, guidelines, and standard. Acceptable Use Policies (AUP) would be an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a logical countermeasure?

A

Logical controls are things like passwords, firewalls, IPS, access lists, and VPN tunnels.

17
Q

Why is a Social Engineering attack so dangerous?

A

Because it leverages users to gain information to compromise security. Users can be misdirected to phishing / pharming sites to give up username / password information, etc.

18
Q

What is ARP Poisoning?

A

An attacker spoofs a Layer 2 MAC address to make devices on the LAN believe that the layer 2 address of the attacker is the L2 address of their default gateway. The attacker than then sniff / capture all data attempting to leave the network. (They may even forward the packet along so that no one suspects anything is wrong. Can be mitigated by Dynamic Address Resolution Protocol Inspection (DAI)

19
Q

What are governmental asset classifications?

A
  • Unclassified
  • Sensitive but unclassified (SBU)
  • Confidential
  • Secret
  • Top Secret
20
Q

What are private sector asset classifications?

A
  • Public
  • Sensitive
  • Private
  • Confidential
21
Q

What are asset classification criteria?

A
  • Value
  • Age
  • Replacement Cost
  • Useful Lifetime
22
Q

What are asset classification roles?

A
  • Owner (the group ultimately responsible for the data)
  • Custodian (the group responsible for implementing the policy as dictated by the owner)
  • User (those who access the data and abide by the rules of use for the data)