CISSP Domain 7 Flashcards

1
Q

Security Operations

A
Operations department responsibility
Administrative management responsibilities
Assurance levels
Configuration management
Physical security
Secure resource provisioning
Network and resource provisioning
Preventive measures
Patch management
Incident management
Recovery strategies
Disaster recovery
Business continuity planning and exercises
Liability
Investigations
Personal safety concerns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Operations pertains to

A

everything that takes place to keep networks, computer systems, applications, and environments up and running in a secure and protected manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Operations also involves

A

detection, containment, eradication, and recovery required to ensure continuity of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Role of Operations Department

A

Continual effort to make sure the correct policies, procedures, standards, and guidelines are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Separation of duties

A

helps prevent mistakes and minimize conflicts of interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Job rotation

A

over time, more than one person fulfills the task of one position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mandatory Vacations

A

an Administrative control

detect fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Initial Program Load

A

Mainframe term for loading an OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration Management

A

process of establishing and maintaining effective system controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Input and Output controls

A

Data entered should be the correct format
Transactions should be atomic
Must be timestamped and logged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bastion Hosts

A

Locked down at entry of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 main types of mechanical locks

A

Warded is basic padlock. Spring loaded bolt with a notch cut in it. Key fits the notch and slides the bolt from locked to unlocked position These are the cheapest

Tumbler has more pieces and parts than a ward lock. Key fits a cylinder pins are raised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 types of tumbler locks

A

pin tumbler most common tumbler lock. key has just the right grooves to put all spring loaded pins in the right position

wafer tumbler also called disk tumbler are small, round locks as on file cabinets Uses wafers, or flat disks instead of pins
lever tumbler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cipher locks

A

programmable locks are keyless and use keypads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fences

A

3 to 4 feet only deter casual trespassers
6 to 7 feet are too high to climb easily
8 foot deter more determined criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PIDAS fencing

A

Perimeter Intrusion Detection and Assessment System

Type of fencing with sensors on the wire mesh of the fence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Gate classifications

A

Class 1 Residential
Class 2 Commercial
Class 3 Industrial
Class 4 Restricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bollards

A

Concrete pillars outside a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mean Time Between Failures

A

How long is a piece of equipment expected to last.

Calculated by average time between failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mean Time to Fail MTTF

A

Life expectancy of a product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mean Time To Repair MTTR

A

amount of time to fix a failure and return to production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Single Points of Failure

A

Firewalls, routers, network servers T1 lines, Hubs, switches, authentication servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RAID

A

Redundant array of Independent Disks

Redundancy and Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Direct Access Storage Device

A

General Term for magnetic disk storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Massive Array of Inactive Disks

A

Carries out mostly write operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Redundant Array of Independent Tapes

A

Striped over multiple tape drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Rainbow Tables

A

All possible passwords in hashed formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Hierarchical Storage Management

A

Continuous backup functionality
Dynamically manages storage and backup of files
Faster media holds files used more often.
Seldom used files are stored on slower devices

29
Q

Trivial File Transfer Protocol

A

Used to save configuration of network devices.

Is insecure

30
Q

Preventive Measures

A
Understand the Risk
Use the right controls
Use controls correctly
Manage your configuration
Assess your operation
31
Q

IPS IDS False Positive

A

detecting intrusions that are not intrusions

32
Q

IPS IDS False negatives

A

system incorrectly classifies as being Benign

33
Q

Baselining

A

Process of establishing normal patterns of behavior

34
Q

Patches are

A

software updates intended to remove a vulnerability or defect in software or provide new features or functionality.

35
Q

Sandboxing

A

isolates executing code from the operating systems

36
Q

Honeypots

A

device developed in order to deceive attackers into believing it is a real production system

37
Q

Honeynet

A

An entire network that is meant to be compromised

38
Q

7 phases of Incident Management

A
Detect
Respond
mitigate
Report
Recover
Remediate
Learn
39
Q

Event is

A

any occurrence that can be observed, verified, and documented

40
Q

Incident is

A

one or more related events that negatively affect the company and/or impact its security posture

41
Q

Cyber Kill Chain

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
    6 Command and control
    7 Actions on the Objective
42
Q

Detection

A

Realize you have a problem

43
Q

Response

A

Determine appropriate action after detection

44
Q

Mitigation

A

after Detection and Response
What happened and what will happen next
Prevent or reduce further damage

45
Q

Reporting

A

After Detection, Response, and Mitigation

Summary
Indicators
Related Incidents
Action Taken
Chain of Custody
Impact Assessment
Identity and comments of incident handlers
Next steps to be taken
46
Q

Recovery

A

After Detection, Response, Mitigation, and Reporting

Return all systems to a known good state
Gather evidence before recovery

47
Q

Remediation

A

After Detection, Response, Mitigation, Reporting and Recovery

Ensure the attack is never successful again

48
Q

Learning

A

What happened
What dd we learn
How can we do it better next time
Postmortem Analysis

49
Q

Recovery Time Objective

A

maximum time period within which a business process must be restored to a designated service level after a disaster

Should be smaller than the MTD value

50
Q

Work Recovery Time WRT

A

remainder of MTD value after the RTO has passed

51
Q

Recovery Point Objective

A

is the acceptable a

Amount of data loss measured in time

52
Q

Hot site

A

facility that is leased or rented and is fully configured to operate withing a few hours

Equipment and software must be completely compatible
Must not cause any negative interoperability issues.

Most expensive of the three types of offsite facilities

53
Q

Warm Site

A

Leased or rented facility that is usually partially configured with some equipment, such as HVAC, and foundational infrastructure components, but not he actual computers

Equipment may need to be procured, delivered, and configured.

54
Q

Cold Site

A

Leased or rented facility that supplies basic environment, electrical, wiring, air conditioning, plumbing and flooring

Is an empty data center.

55
Q

Service Bureau

A

a company that has additional space and capacity to provide applications and services such as a call center.

56
Q

Tertiary Site

A

a secondary backup site

57
Q

Reciprocal agreement

A

with another company to host infrastructure

58
Q

Redundant sites

A

mirrored sites
two sites completely synchronized
ICS2 differentiates between a hot leased site and a redundant company owned site

59
Q

Rolling Hot Site

A

Large truck is turned into a data processing or work area

60
Q

Backups can be

A

Full, differential, incremental, or a combo

61
Q

Archive bit

A

file systems keep track of what files have been modified by setting an archive bit. If a file is modified or created, the file system sets the archive bit to 1

62
Q

Full backup

A

During a full backup the archive bit is cleared

Most companies do a full backup with a differential or incremental backup

63
Q

Differential backup

A

backs up files that have been modified since the last full backup

When restored, the full backup is done first, then differential is put on top of it.

Differential does not change the archive bit

64
Q

Incremental backup

A

all files modified since last full or incremental backup.

Archive bit is cleared.

To restore and incremental backup, restore the full then every incremental backup

65
Q

Disk shadowing

A

similar to disk mirroring

Fault tolerant solution by duplicating hardware and maintaining more than one copy of information

66
Q

Disk duplexing

A

more than one disk controller If on disk controller fails, the other is ready and available

67
Q

Electronic vaulting

A

makes copies of files as they are modified and periodically transmits them to an offsite backup site

Carried out in batches rather than real time

Method of transferring bulk information to offsite facilities

68
Q

Remote Journaling

A

method of transmitting data offsite but only includes moving journal or transaction logs to the offsite facility

Actual files are not moved

Remote is real time

Remote vaulting is in batches

69
Q

High Availability

A

combination of technologies and processes that work together to ensure some specific thing is always up and running