Chapter 4 Flashcards

1
Q

Provides us with the means to trace activities in our environment back to their source.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accountability depends on _____________, _____________, and ____________ being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out.

A

Identification
Authentication
Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A situation in which an individual is unable to successfully deny that they have made a statement or taken action, generally because there is sufficient evidence that they did it.

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

People knowing that they’re being monitored and knowing there will be penalties for acting against the rule are an example of what?

A

Deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPS

A

Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitors and reports malicious activities

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sets off an alarm and takes action when malicious events occur

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A subset of auditing that focuses on observing information about an environment to discover undesirable conditions such as failures, resource shortages, and security issues

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A methodical examination and review of an organization’s records

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ gives you a history of the activities that have taken place in an environment

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tests that find and fix vulnerabilities before any attackers do

A

Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When you mimic the techniques an actual attacker would use to breach a system

A

Penetration Testing (Pen Test)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pen Test

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly