Chapter 1 - Security Basics . Flashcards

1
Q

You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution?

A). Use Hashes
B). Encrypt it before sending
C). Protect it with a digital signature
D). Use RAID

A

B). Encrypt it before sending

Encryption - provides confidentiality of any type of information, including proprietary data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Austin manages network devices in his store and maintains copies of the configuration filed for all the managed routers and switches. On a weekly basis, he creates hashes for these filed and compares them with hashes he created on the same files the previous week. Which of the following cases is he MOST likely using?

A). Supporting confidentiality
B). Supporting integrity
C). Supporting encryption
D). Supporting availability

A

B). Supporting Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his actions?

A). To support steganography
B). To support integrity
C). To support availability
D). To support obfuscation

A

D). To support obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management has mandated the use of digital signatures by all personnel within your organization. Which of the following use cases does this primarily support?

A). Supporting confidentiality
B). Supporting availability
C). Supporting obfuscation
D). Supporting non-repudiation

A

D). Supporting non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include?

A). Ensure critical systems provide uninterrupted service.
B). Protect data-in-transit from unauthorized disclosure.
C). Ensure systems are not susceptible to unauthorized changes.
D). Secure data to prevent unauthorized disclosure.

A

C). Ensure systems are not susceptible to unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your organization wants to reduce the amount of money it is losing due to thefts. Which of the following is the BEST example of an equipment theft deterrent?

A). Snapshots
B). Cable locks
C). Strong passwords
D). Persistent VDI

A

B). Cable locks - are effective equipment theft deterrents for laptops and other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization is considering virtualization solutions. Management wants to ensure that any solution provides the best ROI. Which of the following situations indicates that virtualization would provide the best ROI?

A). Most physical servers within the organization are currently utilized at close to 100% .
B). The organization has many servers that do not require failover services.
C). Most desktop PCs require fast processors and a high amount of memory.
D). Most physical servers within the organization the organization are currently underutilized.

A

D). Most physical servers within the organization are currently underutilized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are preparing to deploy a new application on a virtual server. The virtual server hosts another server application server application that employees routinely access. Which of the following is the BEST method to use when deploying the new application?

A). Take a snapshot of the VM before deploying the new application.
B). Take a snapshot of the VM after deploying the new application.
C). Ensure the server is configured for non-persistence.
D). Back up the server after installing the new application.

A

A). Take a snapshot of the VM before deploying the new application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lopez is not able to access any network resources from his Linux-based computer. Which of the following commands would he use to view the network configuration of his system?

A). ifconfig
B). ipconfig
C). netstat
D). tracert

A

B). ifconfig - command displays network setting in a Linux computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Administrators frequently create VMs for testing. They sometimes leave these running without using them again after they complete their tests. Which of the following does this describe?

A). VM escape
B). VDI snapshot
C). VM sprawl
D). Type ll hypervisor

A

C). VM sprawl - occurs when an organization has many VMs that aren’t managed properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashes provide integrity, not confidentiality (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What three things do digital signatures provide?

A
  • Authentication
  • Non-Repudiation
  • Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a redundant array of inexpensive disk (RAID) provide?

A

A higher availability for disk subsystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean if the hashes are the same on the configuration files?

A

That the files have NOT changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What three things enforce confidentiality?

A
  • Encryption
  • Access Controls
  • Steganography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption uses hashes (T/F) ?

A

False!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does availability ensure?

A

That systems are up and operational when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is steganography?

A

Hiding files within the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Redundant and fault-tolerance methods increase what?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Digital signatures encrypt data (T/F) ?

A

False!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Protecting data and securing data to prevent unauthorized disclosure addresses what?

A

Confidentiality?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digital snapshots that capture the state of a virtual machine at a moment in time refers to what?

A

Snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Passwords prevent unauthorized access to systems, but don’t provide physical security (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A virtual desktop infrastructure (VDI) allows users to access a desktop on a remote server (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A persistent VDI saves the user changes on the desktop, but it does not deter thefts (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Taking a snapshot after the installation allows you to revert the image (T/F) ?

A

False!

27
Q

Is it necessary to back up the server before & after installing the new application?

A

No.

Backing up BEFORE the installation is necessary, but NOT afterwards.

28
Q

What three things does the ‘ifconfig’ command include?

A
  • IP address
  • Subnet Mask
  • Default Gateway assigned to the NIC
29
Q

What kind of computers is the ‘ipconfig’ command given to, to view configurations?

A

Windows computers

30
Q

What does “Netstat” show?

A

Shows network statistics and active connections.

31
Q

“Netstat” shows the network settings (T/F)?

A

False! - only the network statistics & active connections.

32
Q

What does the ‘tracert’ command trace?

A

Traces the route of data and can help determine which network devices are failing.

33
Q

When does a VM sprawl occur?

A

When an organization has many VMs that aren’t managed properly.

34
Q

Unmonitored VMs typically won’t get updated and can be vulnerable to attacks (T/F) ?

A

True!

35
Q

What is a VM escape?

A

An attack that allows an attacker to access the host system from within the virtual system.

36
Q

Users within your organization access virtual desktops hosted on remote servers. This describes which of the following?

A). VDE
B). Snapshots for non-persistence
C). Type l hypervisors
D). VM sprawl

A

A). VDE

37
Q

Your organization has implemented a VDI for most users. When a user logs off, the desktop reverts to its original state without saving any changes made by the user. Which of the following BEST describes this behavior?

A). Container virtualization
B). VM escape
C). Non-persistence
D). Elasticity

A

C). Non-persistence

38
Q

Which type of virtualization allows a computer’s operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel?

A). Container virtualization
B). Type l hypervisor virtualization
C). Type ll hypervisor virtualization
D). VDE

A

A). Container virtualization

39
Q

Type l hypervisor virtualization runs directly on the system hardware (T/F) ?

A

True!

40
Q

Type ll hypervisor virtualization runs ___ that all include their own _____ _____ , including their own _____ .

A
  • VMs
  • operating system
  • kernel
41
Q

What does VDE (virtual desktop environment) provide?

A

A full desktop operating system to users.

42
Q

You are considering rebooting a database server and want to identify if it had any active network connections. Which of the following commands will list active network connections?

A). arp
B). ipconfig
C). ping
D). netstat

A

D). netstat

43
Q

ARP displays information related to what?

A

Media access control (MAC) addresses.

44
Q

What is the purpose of a Ping?

A

Checks connectivity with remote systems.

45
Q

You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use?

A). arp
B). ipconfig
C). netstat
D). ping

A

D). Ping

46
Q

The ping command sends ______ ______ ______ ______ echo requests and checks for ICMP echo ______ .

A
  • Internet Control Message Protocol (ICMP)

- replies

47
Q

What is a use case?

A

Describes a goal that an organization wants to achieve.

48
Q

What starts a use case?

A

A Trigger.

49
Q

What occurs after the Trigger process in a use case?

A

Postcondition.

50
Q

What must occur before the Trigger process can start in a use case?

A

Precondition.

51
Q

A ______ ______ helps professionals identify and clarify requirements to achieve a goal.

A

Use case

52
Q

What are the three primary security control types?

A

• Technical
- implemented with Technology

• Administrative
- using administrative or management methods

• Physical
- using controls that you can physically touch

53
Q

Encryption, antivirus software, IDSs, firewalls, and the principle of least privilege are examples of what type of control?

A

Technical Controls

54
Q

Security awareness & training, configuration management, and change management are examples of what type of control?

A

Administrative controls

55
Q

Preventive controls attempt to prevent ________ incidents.

A

Security

56
Q

System hardening, user training, guards, change management, and account disablement policies are examples of what type of control?

A

Preventive controls

57
Q

______ controls attempt to detect when a vulnerability has been exploited.

A

Detective

58
Q

Log monitoring, trend analysis, security audits, video surveillance systems, and motion detection systems are examples of what types of controls?

A

Detective Controls

59
Q

Corrective controls attempt to ______ the impact of an incident or problem after it had occurred.

A

Reverse

60
Q

Intrusion prevention systems (IPSs), backups, and system recovery plans are examples of what type of controls?

A

Corrective controls

61
Q

______ controls attempt to prevent incidents by dis outraging threats.

A

Deterrent

62
Q

Compensating controls are alternative controls used when it isn’t feasible or possible to use the primary controls (T/F)?

A

True!

63
Q

_______ provides increased availability with various tools such as snapshots and easy restoration.

A

Virtualization

64
Q

_______ virtualization is a specialized version of a Type ___ hypervisor.

A

Container

Type 2 hypervisor