Chapter 5 Flashcards

1
Q

What is ingress monitoring

A

surveillance and assessment of all inbound communications traffic and access attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Egress monitoring

A

monitoring of all outbound network traffic, used to regulate data leaving the organization’s IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of some devices that perform ingress monitoring

A

Firewalls
Gateways
Remote authentication servers
IDS/IPS tools
SIEM solutions
Anti-malware solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Egress monitoring should be combined with DLP and deployed to what attack vectors for Data leak

A

Email (content and attachments)
Copy to portable media
File Transfer Protocol (FTP)
Posting to web pages/websites
Applications/application programming interfaces (APIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an encryption system

A

is the set of hardware, software, algorithms, control parameters and operational methods that provide a set of encryption service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain configuration management

A

a process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the components of configuration management

A

Identification
Baseline
Change Control
Verification and audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the identification of CM

A

Baseline identification of a system and all its components, interfaces and documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define the baseline component of CM

A

A security baseline is a minimum level of protection that can be used as a reference point. Baselines provide a way to ensure that updates to technology and architectures are subjected to the minimum understood and acceptable level of security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define the Change Control component of CM

A

An update process for requesting changes to a baseline, by means of making changes to one or more components in that baseline. A review and approval process for all changes. This includes updates and patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the Verification and Audit of CM

A

A regression and validation process, which may involve testing and analysis, to verify that nothing in the system was broken by a newly applied set of changes. An audit process can validate that the currently in-use baseline matches the sum total of its initial baseline plus all approved changes applied in sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the first step to security baselining

A

Take inventory of the assets you have and their compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the second step to security baselining

A

The baseline is a total inventory of all the system’s components, hardware, software, data, administrative controls, documentation and user instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Third step to security baselining

A

Ensure updating is in place with controls to validate backwards compatibility and forwards compatiiblity of updates. Also perform security review of assets to determine if things once considered secure are still, in fact, secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Final step to security mgmt

A

Patch management mostly applies to software and hardware devices that are subject to regular modification. Orgs should test the patch before rolling it out across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some common security policies

A

BYOD, Change MGMT, Privacy, AUP, Data Handling, password policy

17
Q

Describe Data handleing

A

Determines how data can be used in a company, who can see and use it. May be based on regulatory bases

Proper data classification also helps the organization comply with pertinent laws and regulations.

18
Q

Describe some common items in a AUP

A

Data access
System access
Data disclosure
Passwords
Data retention
Internet usage
Company device usage

19
Q

describe a privacy policy

A

A policy that describes how PII and PHI will be used within an environemnet in acordance with GDPR, HIPAA, PIPEDA)(CA)and other laws concerning this type of data

The organization should also create a public document that explains how private information is used, both internally and externally.

20
Q

What are the three steps in a change management policy

A

deciding to change, making the change, and confirming that the change has been correctly accomplished

21
Q

What is the first component to change mgmt

A

an RFC or request for change is submitted and documented

22
Q

What is the second step in CM

A

Evaluate RFCs for completeness.
Assignment to the proper change authorization process based on risk and organizational

practices, Stakeholder reviews, resource identification and allocation.

Appropriate approvals or rejections, and Documentation of approval or rejection.

23
Q

What activities are included in the third step of CM

A

Scheduling the change, Testing the change, Verifying the rollback procedures, Implementing the change, Evaluating the change for proper and effective operation, and Documenting the change in the production environment

24
Q

True or False? Business continuity planning is a reactive procedure that restores business operations after a disruption occurs

A

Business continuity planning is proactive preparation for restoring operations after disruption

25
Q

What is the risk associated with delaying resumption of full normal operations after a disaster?

A

Alternate operations are typically more costly than normal operations, in terms of impact to the organization; extended alternate operations could harm the organization as much as a disaster.

26
Q

When should a business continuity plan (BCP) be activated?

A

When senior management decides

A senior manager with the proper authority must initiate the BCP.