Chapter 9: Implementing Controls to Protect Assets Flashcards

1
Q

What is a Physical Security Control?

A

A safeguard to protect physical locations and assets from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of Physical Security Controls?

A

Perimeter, Buildings, Secure Work Areas, Server Rooms, and Hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Access Badges?

A

A physical card used to authenticate and allow entry into secured locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Security Guards?

A

They monitor, enforce access, and respond to physical security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Video Surveillance?

A

Monitoring and recording physical spaces to detect and deter unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are sensors?

A

Devices that detect changes and trigger alerts for potential intrusions or anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Motion Sensor?

A

Detects movements within its coverage zone and can trigger an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Noise Detection?

A

Device that detects unexpected or abnormal sounds that may indicate a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Infrared Sensor?

A

A device that can detect heat signatures from bodies or objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Pressure Sensor?

A

A device that can detect changes in weight or force in an area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Microwave Sensor?

A

A device that can sense motion by detecting changes in reflected microwaves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Ultrasonic Sensor?

A

A device that uses sound waves to detect movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Access Control Vestibules?

A

A secure area with two doors to control entry, allowing one person through at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Asset Management?

A

Keeping records of devices and systems to ensure accountability and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Acquisition/Procurement?

A

Buying and onboarding assets following security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Assignment/Accounting?

A

Assigning responsibility for assets to users or teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Monitoring and Asset Tracking?

A

Monitoring the location and state of assets to prevent loss or misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Hardware Asset Management?

A

Tracking and maintaining physical devices to ensure proper use and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What can an effective asset management system help reduce?

A

Architecture and design weaknesses and system sprawl and undocumented assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Software Asset Management (SAM)?

A

The process of tracking and managing software licenses, installations, and compliance to avoid legal and financial risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Defense in Path? AKA layered security.

A

A cybersecurity strategy that uses multiple layers of security controls to protect against threats, so if one layer fails, others still protect the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Data Asset Management?

A

Managing data as an asset by identifying, categorizing, and protecting it throughout its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some example implementations of layered security?

A

Vendor diversity, Technology diversity, and Control Diversity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Skimming?

A

A method where attackers secretly install a device to capture credit/debit card data during legitimate transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Card Cloning?

A

Creating a duplicate of a legitimate card using data stolen via skimming or other techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are Brute Force Attacks?

A

An attack that repeatedly tries different combinations of passwords or encryption keys until the correct one is discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Single Point of Failure?

A

A critical part of a system that, if it fails, causes the whole system or service to become unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are Environmental Attacks?

A

Non-human threats like fire, flood, or power loss that can damage systems and interrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Redundancy?

A

The duplication of critical system components to ensure services continue if one part fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Fault Tolerance?

A

A system’s ability to remain operational even after a failure in one or more components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some Single Points of Failure examples?

A

Disks, Servers, Power, and Personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the Redundant Array of Inexpensive Disks (RAID)?

A

A data storage virtualization method that combines multiple physical drives for performance and redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is RAID-0 (stripping)?

A

Splits data across drives to increase speed; no redundnacy–if one disk fails, all data is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is RAID-1 (mirroring)?

A

Duplicates data on two disks for redundancy; provides fault tolerance but sues twice the storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Disk Duplexing?

A

RAID-1 variation where each drive has its own controller; it improves performance and fault tolerance.

33
Q

What is RAID-5?

A

Stripes data with distributed parity across 3+ disks; allows one disk to fail without data loss.

34
Q

What is RAID-6?

A

Like RAID-5 but with no parity blocks; can survive two simultaneous disk failures.

34
Q

What is RAID-10? AKA RAID-1+0.

A

Combines mirroring and stripping; requires at least 4 disks; fast and fault-tolerant.

35
Q

What is High Availability?

A

System design approach ensuring continuous operation and minimal downtime.

36
Q

What is a Load Balancer?

A

Distributes traffic across multiple servers to ensure availability and improve performance.

36
Q

What is Clustering?

A

Group of connected computers working as a single system to provide redundancy and load distribution.

37
Q

What is an Active/Active Load Balancer?

A

All servers handle traffic simultaneously; maximizes resource usage and performance.

38
Q

What is an Active/Passive Load Balancer?

A

Primary server handles traffic; backup server takes over if the primary server fails.

38
Q

What is NIC Teaming?

A

Combines multiple network interface cards to increase bandwidth or provide failover.

39
Q

What is Backup Media?

A

Physical or digital devices used to store backup data (tape drives, hard disks, SSDs).

39
Q

What are other types of media used to store backups?

A

Disks, Network-attached Storage (NAS), Storage Area Network (SAN), and Cloud Storage.

39
Q

What is Network-attached Storage (NAS)?

A

A storage device connected to a network that allows multiple users to retrieve and store data centrally.

40
Q

What is Cloud Storage?

A

Data storage hosted on the Internet by third-party providers, accessible from anywhere.

40
Q

What are some examples of power supplies that provide redundancy?

A

Uninterruptible power supplies (UPSs), Dual Supply, Generators, and Managed Power Distribution Units (PDUs).

41
Q

What are Offline Backups?

A

Backups stored on devices not connect to the network to prevent cyber threats.

42
Q

What is Storage Area Network (SAN)?

A

A dedicated network that provides block-level storage to servers, used for high-performance, large-scale storage needs.

43
Q

What are Online Backups?

A

Backups done while the system is running, ensuring continuous availability during the backup process.

44
Q

What are Full backups?

A

A complete copy of all data, serving as the foundation for other backup types.

45
Q

What are Differential Backups?

A

A backup of all changes made since the last full backup.

46
Q

What are Incremental Backups?

A

A backup of changes made since the last backup of any type.

47
Q

What are Snapshot and Image Backups?

A

Snapshot captures the system’s state; image backup includes the entire system for full restoration.

48
Q

What is the process for conducting an Differential Backup?

A

Backup data changed since the last full backup.

48
Q

What is the process for conducting a Full Backup?

A
  1. Select all data to back up.
  2. Prepare backup destination.
  3. Start a full data copy.
  4. (Optional) Verify integrity.
  5. Log and schedule next backup.
49
Q

What is Replication?

A

The process of duplicating data to another location for redundancy.

50
Q

What is Journaling?

A

Logging data changes before applying them to help with recovery and integrity.

51
Q

What is the process for conducting an Incremental Backup?

A

Backup only the data changed since the last backup (of any type).

52
Q

When it comes to backups, what are some important geographic considerations to take into account?

A

Offsite vs onsite storage, Distance, Location Selection, Legal Implications, Data Sovereignty, and Encryption.

53
Q

What is a Business Continuity Plan (BCP)?

A

A documented strategy to maintain critical operations during and after a disruption.

54
Q

What is a Business Impact Analysis (BIA)?

A

An evaluation that identifies how disruptions affect critical operations and outlines potential impacts.

54
Q

What are Mission-essential Functions?

A

Core business operations must must continue or quickly resume after a disruption.

55
Q

What is Site Risk Assessment?

A

An evaluation of physical sites to identify threats that may disrupt operations.

56
Q

What is Recovery Time Objective (RTO)?

A

The max time a system can be down before recovery must occur.

57
Q

What is Recovery Point Objective (RPO)?

A

The max acceptable data loss in time (e.g last 4hrs of data).

58
Q

What is Site Resiliency?

A

The capability of a location to continue operating during/after a disruption.

58
Q

What is Mean Time Between Failures (MTBF)?

A

The average time a system operates before failing.

59
Q

What is Mean Time to Repair (MTTR)?

A

The average time it takes to fix a failure and restore service.

59
Q

What is Continuity of Operations Planning (COOP)?

A

A plan that ensures essential functions continue during emergencies.

59
Q

What is a Recovery Site?

A

A location used to recover and restore business operations during a disaster.

60
Q

What is Failover?

A

Automatic switching to a backup system or site when a primary system fails.

61
Q

What is Geographic Dispersion?

A

Placing backup systems in physically separate locations.

62
Q

What is a Hot Site?

A

A fully functional operational recovery site with real-time data replication.

63
Q

What is a Cold Site?

A

A site with infrastructure but no active data or systems.

64
Q

What is a Warm Site?

A

A partially equipped recovery site with updated backups and hardware.

65
Q

What is a Disaster Recovery Plan (DRP)?

A

A documented strategy to restore IT systems and data after a disruption.

66
Q

What are the different phases of a DRP?

A

Active DRP, Implement Contingencies, Recover Critical Systems, Test Recovered Systems, After-Action Report.

67
Q

What are Tabletop Exercises?

A

A discussion-based simulation to test plans and roles without real systems.

68
Q

What is a Simulation?

A

Hands-on training that imitates disaster scenarios without real system interruption.

69
Q

What is Parallel Processing?

A

Running systems simultaneously at a backup site to mirror production.

70
Q

What is a Failover Test?

A

Intentional switching to a backup system/site to verify readiness.

71
Q

What is Capacity Planning?

A

Forecasting resource needs (CPU, RAM, storage, bandwidth, people) for growth or failure.

72
Q

What are the three typical areas that businesses should conduct Capacity Planning?

A

People, Technology, and Infrastructure.