Chapter 5 Mod 2: understand system handling Flashcards

1
Q

What is configuration management, and what is its primary purpose?

A

Configuration management is a process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated. It involves decision-making and control processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the significance of baseline identification in configuration management?

A

Baseline identification involves defining a system and all its components, interfaces, and documentation. It establishes a reference point, ensuring that updates adhere to the minimum acceptable level of security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a security baseline contribute to the configuration management process?

A

A security baseline serves as a minimum level of protection, providing a reference for technology and architecture updates. It ensures that changes maintain the acceptable security standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key components of the update process in configuration management?

A

The update process involves requesting changes to a baseline, reviewing and approving changes, and applying updates and patches. It ensures that modifications align with security standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is regression and validation essential in configuration management?

A

Regression and validation processes verify that system changes do not break existing components. This may involve testing and analysis, and the audit process ensures that the current baseline aligns with all approved changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does effective configuration management benefit systems owners, operators, support teams, and security professionals?

A

Effective configuration management provides these stakeholders with tools to monitor and oversee the configuration of devices, networks, applications, and projects within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what way does an organization use standards and baselines to mandate equipment configuration?

A

Organizations use standards and baselines to ensure consistency in configuring network devices, software, hardware, and endpoint devices. These standards help maintain compliance with the organization’s security baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What role do standards and baselines play in ensuring consistent configuration across an organization’s infrastructure?

A

Standards and baselines ensure that network devices, software, hardware, and endpoint devices are configured consistently. They help maintain compliance with the established security baseline for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What actions can be taken if a device is found to be non-compliant with the security baseline?

A

If a device is not compliant with the security baseline, it may be disabled or isolated into a quarantine area until it can be checked and updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does configuration management contribute to maintaining security standards for an organization?

A

Configuration management, through the use of standards and baselines, helps in configuring devices consistently, ensuring compliance with the security baseline. It enables the organization to enforce and monitor security standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the first step in any asset management process, and why is it crucial?

A

The first step in any asset management process is making an inventory, catalog, or registry of all information assets that the organization is aware of. This is crucial because you can’t protect what you don’t know you have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is it challenging to maintain the consistency and currency of an inventory of information assets?

A

It is challenging to maintain consistency and currency in the inventory because it’s difficult to identify every physical host and endpoint, along with the continuous task of gathering data from them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is emphasized by the statement, “You can’t protect what you don’t know you have”?

A

The statement emphasizes the importance of awareness and recognition of all information assets through a comprehensive inventory, as protection is only possible when there is knowledge of existing assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is the health and status of an asset inventory important with respect to updates and patches?

A

The health and status of an asset inventory are important for ensuring that updates and patches are consistently applied. It helps in maintaining a secure and up-to-date environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What makes it challenging to identify every physical host and endpoint for inclusion in an asset inventory?

A

Identifying every physical host and endpoint is challenging due to the diverse and evolving nature of organizational infrastructures. The task becomes even more complex as new assets are created, acquired, or added to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the significance of having a baseline in the context of a commercial software product with numerous components?

A

A baseline in a commercial software product serves as a total inventory of all the system’s components, ensuring that if any element is missing, the system cannot function correctly.

17
Q

How are baselines utilized once controls are implemented to mitigate risks in the protection of assets?

A

Once controls are in place to mitigate risks, baselines are referenced for further comparisons and development. All measures are then evaluated against these established baselines.

18
Q

How can baselines be particularly helpful in achieving a minimal protection level for assets based on their value?

A

Baselines are helpful in achieving a minimal protection level based on value by conforming to the minimum security levels required for assets classified according to their value. This ensures that the protection measures align with the asset’s importance.

19
Q

In asset protection, how does the establishment of meaningful baselines contribute to conforming to minimum security levels?

A

Meaningful baselines contribute to conforming to minimum security levels by providing a reference point for each classification level of assets. This allows organizations to meet the minimum security requirements for assets classified based on their value.

20
Q

How can the use of classifications such as high, medium, and low be integrated with baselines for security requirements?

A

Classifications like high, medium, and low can be integrated with baselines by developing specific baselines for each classification level. This ensures that the minimum security levels required for each classification are met, aligning with the value and importance of the assets.

21
Q

Why are repairs, maintenance actions, and updates frequently required across various levels of system elements?

A

Repairs, maintenance actions, and updates are necessary across system elements to ensure the proper functioning and reliability of the IT architecture, operating systems, applications platforms, networks, and user interfaces.

22
Q

What is the purpose of acceptance testing in the context of modifications to a system?

A

Acceptance testing is conducted to verify that newly installed or repaired functionality works as required after modifications have been made to the system.

23
Q

Why is regression testing essential after modifications to a system?

A

Regression testing is essential to verify that modifications did not introduce other erroneous or unexpected behaviors in the system, ensuring that the overall functionality remains intact.

24
Q

How does ongoing security assessment differ from acceptance testing in the context of system modifications?

A

Ongoing security assessment evaluates whether a system that passed acceptance testing remains secure over time. It focuses on continuous evaluation to ensure the system’s security posture is maintained.

25
Q

Why is it crucial to conduct ongoing security assessment and evaluation testing even after acceptance testing is successful?

A

Ongoing security assessment is crucial because it ensures that, over time, the system that initially passed acceptance testing continues to meet security requirements. It helps identify and address any emerging security vulnerabilities or threats.

26
Q

What is a patch in the context of patch management, and why are patches necessary for software and hardware devices?

A

A patch is an update, upgrade, or modification to a system or component. Patches are necessary to address vulnerabilities or improve functionality in software and hardware devices.

27
Q

Why is maintaining all patches a challenge for security professionals, and what standards, like PCI DSS, emphasize the timely deployment of security patches?

A

Maintaining all patches is challenging due to irregular intervals and diverse sources. Standards like PCI DSS require organizations to deploy security patches within a specified timeframe.

28
Q

What is a common issue associated with the use of patches, and why is it important for organizations to test patches before widespread deployment?

A

A common issue is the impact of flawed patches affecting system functionality. Organizations should test patches to identify potential issues before widespread deployment, but this can be complicated by a lack of an exact testing environment.

29
Q

What challenges do organizations face when testing patches, and why is it crucial to test patches in an environment similar to the production environment?

A

Organizations face challenges due to budget constraints for maintaining a testing environment identical to production. It is crucial to test patches in a similar environment to identify potential issues that might arise in the production environment.

30
Q

How do vendors contribute to patch management, and what risks are associated with unattended patching processes?

A

Vendors often offer patch management solutions with automated processes for unattended updates. However, unattended patching poses risks such as unscheduled outages, requiring a balance between automated patching and the risk of having unpatched systems in the organization’s network.

31
Q

Why is it essential to have a robust change management process before implementing any changes in a production or live environment?

A

A robust change management process ensures careful planning, testing in model environments, and consideration of unintended consequences before making changes in a production or live environment.

32
Q

What is the significance of testing changes in model environments, and why might organizations face challenges in maintaining separate testing environments?

A

Testing changes in model environments helps identify potential issues. Challenges arise in maintaining separate testing environments, leading some organizations to rely on third-party testing or vendor certifications based on generic data.

33
Q

Why is having a rollback plan crucial when implementing changes, and what does a rollback involve in the context of system modifications?

A

A rollback plan is crucial for restoring the system to its pre-change state in case of unintended consequences. A rollback involves reverting the system to a state where it was known to be working properly before introducing changes.

34
Q

In what situations is a rollback plan absolutely critical, and why might some organizations be unable to fully test changes before implementation?

A

A rollback plan is absolutely critical in environments where organizations are unable to fully test changes. Some organizations may lack separate testing environments and rely on third-party testing, making a rollback plan crucial.

35
Q

How can organizations mitigate the logistical challenge of maintaining separate testing environments, and what role does third-party testing play in the absence of dedicated testing environments?

A

Organizations can mitigate logistical challenges by relying on third-party testing for certification based on generic data when maintaining separate testing environments is difficult.

36
Q
A