Domain 5 Flashcards

Security Operations

1
Q

What is the most important aspect of security awareness/training?

A

Protecting health and human safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Degaussing is

A

The process of reducing or eliminating an unwanted magnetic field (or data) stored on tape and disk media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way?

A

Data life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the life cycle of data handling?

A

Create, store, use, share, archive, destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do integrity services, provided by hash functions and digital signatures, allow a recipient to verify?

A

That a message has not been altered by malice or error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of security awareness training?

A

To align information security goals with the organization’s mission and vision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of storing passwords as hash values or digests?

A

To check if a password matches without revealing the password itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of security engineers in data security?

A

Security engineers figure out who is trying to log in and assess security codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How long does it take to crack a 10-number password using software with cryptographic calculation?

A

5 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is something that every security policy should have?

A

Consequences for non-compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whaling attacks are

A

Phishing attacks that attempt to trick
highly placed officials or private individuals
with sizable assets into authorizing large
fund wire transfers to previously unknown
entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the term “whaling attacks” refer to in the context of phishing?

A

Attacks against highly placed officials or individuals with sizable assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What task is recommended for employees to practice what they’ve learned?

A

Sending simulated phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What solution is recommended for users who struggle to remember multiple passwords for different systems?

A

Encourage the use of a recommended password management solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is asymmetric encryption considered more secure?

A

It involves a unique code for the sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does hashing respond to minor changes in the input, such as misspellings or changes in letter case?

A

It generates a different hash digest for each input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is meant by the term rollback?

A

Restoring the system to its previous state before a change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who is often tasked with coordinating the change management effort?

A

Information Security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the first step in the change management process?

A

Request for Change (RFC)

20
Q

Application Server

A

A computer responsible for hosting applications to user workstations

21
Q

Asymmetric Encryption

A

An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext

22
Q

Checksum

A

A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data.

23
Q

Classification

A

Classification identifies the degree of harm to the organization, its stakeholders or others that might result if an information asset is divulged to an unauthorized person, process or organization. In short, classification is focused first and foremost on maintaining the confidentiality of the data, based on the data sensitivity

24
Q

Configuration management

A

A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated

25
Q

Data Loss Prevention (DLP)

A

System capabilities designed to detect and prevent the unauthorized use and transmission of information.

26
Q

Degaussing

A

A technique of erasing data on disk or tape (including video tapes) that, when performed properly, ensures that there is insufficient magnetic remanence to reconstruct data

27
Q

Digital Signature

A

The result of a cryptographic transformation of data which, when properly implemented, provides the services of origin authentication, data integrity, and signer non-repudiation.

28
Q

Egress Monitoring

A

Monitoring of outgoing network traffic.

29
Q

Hardening

A

A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application, etc. Hardening is normally performed based on industry guidelines and benchmarks, such as those provided by the Center for Internet Security (CIS)

30
Q

Hash Function

A

An algorithm that computes a numerical value (called the hash value) on a data file or electronic message that is used to represent that file or message and depends on the entire contents of the file or message. A hash function can be considered to be a fingerprint of the file or message

31
Q

Hashing

A

The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.

32
Q

Information Sharing

A

The requirements for information sharing by an IT system with one or more other IT systems or applications, for information sharing to support multiple internal or external organizations, missions, or public programs

33
Q

Ingress Monitoring

A

Monitoring of incoming network traffic

34
Q

Message Digest

A

A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated

35
Q

Operating System

A

Operating System
The software “master control application” that runs the computer. It is the first program loaded when the computer is turned on, and its main component, the kernel, resides in memory at all times. The operating system sets the standards for all application programs (such as the Web server) that run in the computer. The applications communicate with the operating system for most user interface and file management operations.

36
Q

Patch

A

A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component

37
Q

Patch Management

A

The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and service packs

38
Q

Records Retention

A

A practice based on the records life cycle, according to which records are retained as long as necessary, and then are destroyed after the appropriate time interval has elapsed.

39
Q

Remanence

A

Residual information remaining on storage media after clearing

40
Q

Request for change (RFC)

A

The first stage of change management, wherein a change in procedure or product is sought by a stakeholder

41
Q

Security Governance

A

The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization.

42
Q

Social engineering

A

Tactics to infiltrate systems via email, phone, text, or social media, often impersonating a person or agency in authority or offering a gift. A low-tech method would be simply following someone into a secure building

43
Q

Symmetric encryption

A

An algorithm that uses the same key in both the encryption and the decryption processes

44
Q

Web Server

A

A computer that provides World Wide Web (WWW) services on the Internet. It includes the hardware, operating system, Web server software, and Web site content (Web pages). If the Web server is used internally and not by the public, it may be known as an “intranet server.”

45
Q

Whaling Attack

A

Phishing attacks that attempt to trick highly placed officials or private individuals with sizable assets into authorizing large fund wire transfers to previously unknown entities.