Domain 1 Flashcards

1
Q

CIA - Authorization - Attacks

A

Confidentiality - MAC - Social Engineering
Integrity - RBAC - HASH
Availability - DAC - DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAAA

A

Id
Authentication - something ur, know, have
Authorization - DAC, MAC, RBAC, ABAC
Accounting - Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Content base AC vs Context

A

Access content based on rights
Access based on parameters/ conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Qualitative risk vs quantitative

A

How likely it is to happen
How much it’ll cost if it happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DAC, MAC, RBAC, ABAC

A

Access based on given rights by owner
Confidentiality like military
Access based on role given and assigned job
Policy engine gives access based on conditions and role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control category

A

Admin (directive) - policy
Tech (logic) - hardware/ software
Physical - locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Types

A

CC PDD
corrective, compensating, preventive, detective, deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Cyle

A

ID risk > risk assessment (Q2) > risk response (second, transfer, avoidance, Do not Reject risk) > Contro/monitoring ( KGI, KPI, KRI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk = threat X vulnerability

A

Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Criminal, Civil, ECPA, CFAA, PC-DSS

A

Punish/ deter society, individuals/ group, protect against wire tapping, law to prosecute crime, credit card standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security governance principle
Vision, mission, strategic objectives, Action, guidelines

A

Hope, motivation, plans/goals, resource, recommendation (non mandatory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BCP, COOP, crisis communication plan, OEP, BRP

A

process of creating long term strategic planning and procedure after disaster.
How we operate during a disaster.
Person speaks to press.
How we protect facility and staff in disaster.
List of steps needed to recover back to normal business from disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CMP

A

Coordination w management in an emergency, steps to ensure safety of personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DRP cycle

A

Disaster recovery plan
Mitigation ( pre disaster mitigation), preparation (educ), response ( emergency plan), recovery ( post disaster recovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DRP Simulated test - Review, read through, walk through, simulation

A

Team looks at gaps
Manager goes through recovery process
Tabletop
The whole team does scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DRP physical test - partial interruption, response, recovery

A

Off hours
How we react
Re establish recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIA, RPO, MTTR, MOR, MTBF

A

Id critical and non critical system
Acceptable data we can loose
how long it’ll take to recover
Minimum requirements to operate
How long new component will fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Incident management (event)

A

Monitor/ detection of security event and react to them
Event > alert > incident > problem > inconvenience > emergency > disaster > catastrophe

19
Q

Incident management life cycle

A

Prep (prepare for incident) > detect (analyze IPS) > response (team works on affected system) > mitigation (know the cause) > Report/recover/remediation > lessons learned

20
Q

Identify and access provisioning life cycle

A

Policy defines a persons credential access NO activity FOR 30 days

21
Q

Federated ID, FIDM, SSO

A

Persons electronic ID across systems
Policy to manage ID of user across org USAF
CAC - single sign on for multiple system

22
Q

Lights, CCTV, fence, TSA, Guard, Dog

A

Detect/deter
Deter/preventative
Preventative, detective, deterrent
Deterrence, detect, prevent, compensate
Deter, detect, compensate

23
Q

Separation of duties, Job rotation, Mandatory vacation

A

Need 2 people to do the task.
Detect error/ fraud like turnover, rotate jobs.
One person is not performing the same task

24
Q

Data classification

A

TS war plans - Confidential trade secrets (grave danger)
S deployment plans - Private PII (serious damage)
Confidential report - Sensitive system info (damage)

25
Q

Circuit switching, packet switching, QoS

A

One dedicated circuit (Caro)
Switches packets (cheap)
Prioritizes specific data traffic like voip

26
Q

LAN, MAN, WAN, GAN

A

Local like Campus KState
Like Manhattan
Manhattan to KC
Global

27
Q

IPV4 vs IPV6

A

32 bits
128 and IPSEC

28
Q

ARP, ICMP

A

Has IP and ask network who has it to receive MAC address so they can communicate.
Network analysis tool, ping, trace route

29
Q

HTTP, HTTPS, DHCP ports, NAC

A

80
443
67 server 68 client assigns IP to client
System adheres to security policy

30
Q

STP, UTP

A

Extra shielded
Un shielded wire

31
Q

VLAN, VXLAN Layer

A

Layer 2
Physically shares switch but virtually separated
Beyond switch can go to multiple locations

32
Q

Router layer, static, default gate way, dynamic route, metric

A

Layer 3 IP and port connect LAN to WAN.
Preconfigured route admin has to create.
Sends non local traffic to ISP our exit to internet.
Auto routing.
Determines best route.

33
Q

OSI layers

A

Please(bit) do(frame) not(packet) throw(segment) sausage pizza away (data)

34
Q

TCP/IP

A

Link physical (1-2), network 3, transport 4, application (5,6,7)

35
Q

SDN, SD-WAN, SDx

A

Control/manage network via software separate control and data plane.
Connects multiple WAN in single point to use resource.
Connects to everything

36
Q

Stealth, polymorphic, multipart, macro

A

Hide from OS, changes signature definition, spreads in different vector, document/file

37
Q

Signature, heuristic

A

Looks for signature (pattern)
Behavior

38
Q

HIPS, NIDS/NIPS

A

Can see unencrypted data on workstation.
Can’t look at encrypted

39
Q

IDS, IPS, attacks fragmentation, avoid default, low bandwidth

A

Sends alert
Takes action
Sends fragmented packet
Attacker using unexpected port
Did attackers using numerous ports

40
Q

TP, TN, FP, FN

A

Attack/system acts
Normal traffic/nothing
Normal traffic/ system attacks
Attack/ system doesn’t act

41
Q

SOAR

42
Q

Firewall layer, stateful filtering, attack, proxy

A

Layer 1-3.
1-4 if in routing table it’s good, need to connect with outside so they can communicate.
DDoS to overwhelm table.
Gateway from one net to another asking request from internet

43
Q

NGFW, DMZ, stuxnet, hypervisor, type 1 and 2, attack on cloud

A

IDS/IPS antivirus w deep packet inspection.
Segregated network between firewall.
3 modules worm>link>rootkit.
Controls access bw guest and host hardware.
Metal installed on top of hardware, everything runs on HV.
Runs in computers OS.
VM escape attacker jumps from host to client.