Chapter 9: Implementing Controls to Protect Assets Flashcards

1
Q

____ ____ (or defense in depth) employs multiple layers of security to protect against threats. Personnel constantly monitor, update, add to, and improve existing security controls.

A

Layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ diversity is the use of different security control types, such as technical controls, administrative controls, and physical controls.

A

Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ diversity is the practice of implementing security controls from different vendors to increase security.

A

Vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ security controls are controls you can physically touch. They often control entry and exit points, and include various types of locks.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An____ is a physical security control that ensures that a computer or network is physically isolated from another computer or network.

A

airgap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Controlled areas such as data centers and server rooms should only have a single ____ and ____ point. Door lock types include cipher locks, proximity cards, and biometrics.

A

entrance and exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ ____ can electronically unlock a door and helps prevent unauthorized personnel from entering a secure area. By themselves, they do not identify and authenticate users. Some systems combine them with PINs for identification and authentication.

A

proximity card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ occurs when one user follows closely behind another user without using credentials.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ can prevent tailgating.

A

mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ ____ are a preventive physical security control and they can prevent unauthorized personnel from entering a secure area. A benefit is that they can recognize people and compare an individual’s picture ID for people they don’t recognize.

A

Security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cameras and ___-___ ___ ____ provide video surveillance. They provide reliable proof of a person’s identity and activity.

A

closed-circuit television (CCTV) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fencing, lighting, and alarms are commonly implemented with motion detection systems for physical security. ____ motion detection systems detect human activity based on the temperature.

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ provide stronger physical security than fences and attempt to deter attackers.

A

Barricades

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ are effective barricades that allow people through, but block vehicles.

A

Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ ____ secure mobile computers such as laptop computers in a training lab.

A

Cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ ____ include locking cabinets or enclosures within a server room.

A

Server bays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ ____processes protect against vulnerabilities related to architecture and design weaknesses, system sprawl, and undocumented assets.

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____ ____ and ___ ______ systems control airflow for data centers and server rooms. Temperature controls protect systems from damage due to overheating.

A

Heating, ventilation, and air conditioning (HVAC)

19
Q

___ and ____ aisles provide more efficient cooling of systems within a data center.

A

Hot and cold

20
Q

___ ____ prevents problems from EMI sources such as

fluorescent lighting fixtures. It also prevents data loss in twisted-pair cables.

A

EMI shielding

21
Q

A ____ ____ prevents signals from emanating beyond a room or enclosure.

A

Faraday cage

22
Q

A ___ ____ __ ____ is any component that can cause the entire system to fail if it fails.

A

single point of failure

23
Q

____ disk subsystems provide fault tolerance and increase availability. ____ (mirroring) uses two disks. ____ uses three or more disks and can survive the failure of one disk. ____ and ____ use four or more disks and can survive the failure of two disks.

A

RAID
RAID-1
RAID-5
RAID-6 and RAID-10

24
Q

Load balancers spread the processing load over multiple servers. In an ____-____ configuration, all servers are actively processing requests. In an ____-____ configuration, at least one server is not active, but is instead monitoring activity ready to take over for a failed server. Software-based load balancers use a virtual IP.

A

active- active

active-passive

25
Q

____ ____ sends client requests to the same server based on the client’s IP address. This is useful when clients need to access the same server for an entire online session. Round-robin scheduling sends requests to servers using a predefined order.

A

Affinity scheduling

26
Q

____ strategies include full, full/differential, full/incremental, and snapshot strategies. A ____ backup strategy alone allows the quickest recovery time.

A

Backup

full

27
Q

____/____ backup strategies minimize the amount of time needed to perform daily backups.

A

Full/incremental

28
Q

____ ____ verify the integrity of backups and that it can be restored in its entirety.

A

Test restores

29
Q

Backups should be ____ to identify the contents. A copy of backups should be kept ____-____.

A

labeled

off-site

30
Q

The data contained in the backups can have legal implications. If it includes ___ ___ ___ or ___ ___ ___, it must be protected according to governing laws.

A

Personally Identifiable Information (PII) or Protected Health Information (PHI)

31
Q

The location of the data backups affects the data ____. If backups are stored in a different country, the data on the backups is now subject to the ___ and _____ of that country.

A

sovereignty

laws and regulations

32
Q

A ____ ____ ____ is part of a business continuity plan (BCP) and it identifies mission-essential functions, critical systems, and vulnerable business processes that are essential to the organization’s success.

A

business impact analysis (BIA)

33
Q

The ___ ___ ____ identifies maximum downtimes for critical systems and components. It considers various scenarios that can affect these systems and components, and the impact to life, property, safety, finance, and reputation from an incident.

A

business impact analysis (BIA)

34
Q

A ____ _____ assessment identifies if a system processes data that exceeds the threshold for PII. If the system processes PII, a privacy impact assessment helps identify and reduce risks related to potential loss of the PII.

A

privacy threshold

35
Q

A ____ ____ ____ identifies the maximum amount of time it should take to restore a system after an outage. The ____ ___ ____ refers to the amount of data you can afford to
lose.

A

recovery time objective (RTO)

recovery point objective (RPO)

36
Q

____ ____ ___ ____ identifies the average (the arithmetic mean) time between failures.

A

Mean time between failures (MTBF)

37
Q

The ____ ____ ___ ____ identifies the average (the arithmetic mean) time it takes to restore a failed system.

A

mean time to recover (MTTR)

38
Q

____ of _____ planning identifies alternate processing sites and alternate business practices.

A

Continuity of operations

39
Q

____ ____ provide alternate locations for business functions after a major disaster.

A

Recovery sites

40
Q

A ___ site includes everything needed to be operational within 60 minutes. It is the most effective recovery solution and the most expensive.

A

hot

41
Q

A ____ site has power and connectivity requirements and little else. It is the least expensive to maintain.

A

cold

42
Q

____ sites are a compromise between hot sites and cold sites.

A

Warm

43
Q

Periodic testing validates continuity of operations plans. Exercises validate the steps to restore individual systems, activate alternate sites, and document other actions within a plan. _____ exercises are discussion-based only. _____ exercises are hands-on exercises.

A

Tabletop

Functional