Domain 3 Flashcards

1
Q

What do Data Centers contain?

A

Contains all of the servers, storage, and other computing resources needed to run business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a flaw for Server Rooms?

A

Lacks strong security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Media storage facilities contains what?

A

Contains sensitive data and must have security standards equal to or even greater than the main data center due to their remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Evidence storage rooms?

A

Room safe from intrusion that stores evidence that may be used in court. Investigators must document and preserve chain of custody ensuring evidence is not tampered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if a Wiring Closets is not properly secured?

A

If not properly secured, they can offer an intruder physical access to eavesdrop on network communications or gain access to sensitive networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cable distribution runs are what?

A

Cable that leaves wiring closets and travel around an organization’s facility to deliver network connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bollards are what?

A

Used to block sidewalks and access roads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crime Prevention through environmental design (CPTED) have what 3 goals?

A

3 goals:
1. Natural surveillance – facilities are designed in a way that allows employees and passerby to observe what is happening around the facility and notice a potential intruder
2. Natural access control – Uses gates and other structures to funnel people into a single point of entry and limits ability of an intruder to get to areas where they might not be under surveillance
3. Natural territorial reinforcement – Makes it obvious that an area is closed to the public through signage, landscaping, lighting, and similar techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Closed-circuit television (CCTV) cameras provide what?

A

Provides an added level of monitoring to areas where visitors are present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two-person rule ensures what?

A

Ensures personnel involved in very sensitive operations act appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two-person integrity required what?

A

Two people be present for any access to a sensitive area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two-person control is used for what?

A

Used to control access to very sensitive functions, requiring the concurrence of two individuals to carry out an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization is what?

A

Final step in access control process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Least privilege is what type of principle

A

Principle stating that an individual should only have minimum set of permissions necessary to accomplish their job duties
2 important reasons:
1. Minimizes potential damage from insider attack
2. Limits ability of an external attacker to quickly gain privileged access when compromising an employee’s account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Segregation of duties means what?

A

No single person should possess two permissions that, in combination, allow them to perform a sensitive operation
“Separation of duties”
Exam uses segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization Models contains what 3 Access Controls?

A

Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mandatory Access Control (MAC) is what?

A

Most stringent type of access control
Operating system itself restricts permissions that can be granted to users and processes on system resources. Permissions granted by systems based on series of labels placed on users and objects they want to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Discretionary Access Control (DAC) is what?

A

Allows users to assign access permissions to other users; owners of files, computers, and other resources have discretion to configure permissions as they see fit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Role Based Access Control (RBAC) is what?

A

Admins create job-based roles and then assign permissions to those roles. They then assign users to the roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some Account types

A

User
Administrator
Guest
Shared/Generic
Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

User accounts is what?

A

Assigned to individual user and grants routine access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Administrator account have what?

A

Have extensive privileges to modify system configurations.
Highly Sensitive
Guarded by using Privileged Account Management (PAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Guest Accounts provide what?

A

Provides users with temporary access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Shared/Generic Accounts is what?

A

Account where more than one individual has access to use the account
Difficult to trace who performed an action with shared account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Service Accounts is used how?

A

Used internally by a system to run a process or perform other actions

25
Q

Non-Repudiation is what type of security goal?

A

Security goal that prevents someone from falsely denying that something is true.

26
Q

Digital signature uses what?

A

Uses encryption technology to provide non-repudiation for electronic documents

27
Q

Account Management Tasks do what?

A

Implementing job rotation schemes
Mandatory Vacation Policies
Managing the account life cycle

28
Q

Job Rotation do what?

A

Moves employees through different positions
Added security benefit of reducing the likelihood of fraud

29
Q

Mandatory Vacation policies requires what?

A

Require time away from work
Requires staff in key positions take a minimum number of consecutive vacation days each year and not have access to corporate systems

30
Q

Managing account life cycle is what?

A

Name convention – aids in identifying specific users

31
Q

Inaccurate permissions mean what?

A

Block work and/or violate least privilege

32
Q

Account audits protect against what?

A

Protect against inaccurate permissions
USER ACCOUNT AUDITS:
1. Pulls permissions list
2. Review with managers
3. Making adjustments

33
Q

Attestation does what?

A

Reviews formal approval documentation

34
Q

Continuous Account Monitoring does what?

A
  1. Watch for suspicious activity
  2. Alert administrators to anomalies
35
Q

Access Policy Violations implies to what?

A
  1. Impossible travel time logins
  2. Unusual network location logins
  3. Unusual time-of-day logins
  4. Deviations from normal behaviors
  5. Deviation in volume of data transferred
36
Q

Geotagging adds what?

A

Adds user location information to logs

37
Q

Geofencing alerts what?

A

Alerts when a device leaves a defined boundary

38
Q

Provisioning means what?

A

After onboarding, admins create authentication credentials and grant appropriate authorization

39
Q

Deprovisioning means what?

A

During offboarding process
Admins disable accounts and revoke authorizations at the appropriate time

40
Q

Prompt Termination is Critical. Why?

A

Prevents users form accessing resources without permission
Especially critical when a user leaves under adverse circumstances

41
Q

Routine Workflow disables what?

A

Disables accounts on a scheduled basis for planned departures

42
Q

Emergency Workflow immediately does this.

A

Immediately suspends access when user is unexpectedly terminated

43
Q

Incorrectly Timed Account Revocations does what?

A

May inform a user in advance of pending termination
May allow a user access to resources after termination

44
Q

What are the Administrative Controls in relation to Access control?

A

Directive Controls. Organizational policies and procedures

45
Q

What are the Technical Controls in relations to Access Controls?

A

Hardware/software/firmware - firewalls, routers, encryption

46
Q

What are physical controls in relation to Access Controls?

A

Locks, fences, guards, dogs, gates, bollards

47
Q

What are the 6 different types of access controls?

A

Preventative - prevents attacks
Detective - detects during or after an attack
Corrective - corrects an attack
Recovery - helps recover
Deterrent - deter attacks
Compensating - compensates from an attack

48
Q

Name the ASTM Standard Gates

A

Class I Residential
Class II Commercial/General Access
Class III Industrial/Limited Access
Class IV Restricted Access

49
Q

What are the Centralized Pros (Decentralized Cons) for Access Control Systems?

A

All systems and locations have the same security posture

50
Q

What are the Centralized Cons (Decentralized Pros) for Access Control Systems?

A

Traffic overhead and response time

51
Q

Hybrid is what in regard to the centralized and decentralized controls?

A

Centrally-controlled. Both Centralized and decentralized controls are used

52
Q

What is JIT?

A

Just in Time Access Control

Employee logs into normal account
The first time they visit third party website, the website confirms employment
Confirm how longwith employment to determine how many points to give.

53
Q

What is context-based access control?

A

Access to an object is controlled based on certain contextual parameters, such as location, time sequence of responses, access history

ABAC

54
Q

Content-Based Access Control is what?

A

Access provided based on attributes or content of an object (content-dependent access control)

55
Q

Least privilege is the minimum necessary access. What do we give the users/systems?

A

Exactly the access they need, nor more, no less

56
Q

What should be known even if you have access to Need to Know materials?

A

If you do not need to know, then you should not access the data.

57
Q

What is the concept of Separation of Duties?

A

More than one individual in one single task is an internal control intended to prevent fraud and error

58
Q

What do we know of Job Rotations?

A

To detect errors and frauds. Easier to detect fraud and there is less chance of collusion between individuals if they rotate jobs

59
Q

Why must Mandatory Vacations be done?

A

To ensure one person is not always performing the same task, someone else has to cover and it can keep fraud from happening or help detect it.