CySA+ Study Notes 6 Flashcards

1
Q

Transitive Trust : trust goes across domains. Non-Transitive Trust : trust is not automatic unless admin permits it.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

end user is called the principal, then there is the org. providing the proof of identity known as identity provider; and there is the web-based service that user wishes to access, this org. is known as service provider.

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

allows org.’s to move IAM to the cloud.

A

IDaaS (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? permissions are grouped together into functional roles and users are assigned to those roles.

??? allows admins to make access control decisions based upon characteristics of user, object, and environment. ex : user must be a manager AND user must be the employees manager OR that managers manager AND date must be later than March 15, 2018.

??? access control system where OS enforces security policies that users may not modify.

??? access control system where permissions may be set by owners of files, computers and other resources.

A

Role-BAC / ABAC / MC / DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a self-contained app that runs on laptop/desktop and doesnt interact w/any other systems.

A

Endpoint app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(1) Developing System requirements, (2) Developing software Requirements, (3) Produce Preliminary design from those requirements (4) That is used for basis for a detailed design (5) Code and Debugging creating software (6) Testing : tested rigorously and if passed tests moves into (6) Operations and Maintenance

A

Waterfall Model (Very Linear Approach - this approach allows for backward movement but only one phase at a time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(1) Determine Requirements (objectives, alternatives, constraints), (2) Risk Assessment (evaluating alternatives, identifying and resolving risks), (3) Development and Testing (develop and test the code), (4) Planning (for future development work).

A

Spiral Model (Iterative Process - move through phases multiple times until satisfied product is est.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(1) Value individuals and interactions over processes and tools, (2) Value working software over comprehensive documentation, (3) Value customer collaboration over contract negotiation, (4) Value responding to change over following a plan.

A

Agile Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Level 1 : Initial - creating software with good intentions, but disorganized approach to software development, Level 2 : Repeatable - org. has basic processes like reusing code between projects, requirements management, software project planning, software project tracking and oversight, etc … Level 3 : Defined - have formal documented practices which include process definition, training programs, software engineering etc … Level 4 : Managed - use quantitative measures to evaluate their progress, Level 5 : Optimizing - use continuous process improvement to strive to always get better.

A

Maturity Models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(1) Request Control : manages, evaluates, and prioritizes inbound request from customers. (2) Change Control : grants permission to developers to make changes to application code. (3) Release Control : moves code from development environment to production.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly