Domain 5 :Given a scenario, implement security awareness practices Flashcards

1
Q

Social Engineering

A

social engineering techniques to manipulate human psychology, exploiting emotions such as trust, curiosity, or fear to convince recipients to take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofed Communication

A

Cybercriminals often use email addresses, URLs, or phone numbers that appear legitimate to deceive their targets. These are known as “spoofed” elements and are designed to mimic trusted sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anomalous Behavior Recognition (ABR)

A

refers to the identification of unusual patterns or behaviors within a system or on the network. There are three types of anomalous behavior recognition, which are defined as follows:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risky Behaviors

A

Risky behavior represents actions that, while not necessarily malicious, carry a heightened level of risk or potential harm to a system or organization. This can include actions such as granting excessive permissions, sharing login credentials, downloading suspicious files, or ignoring security warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unexpected

A

Unexpected behavior is characterized by actions or activities that deviate from established norms or historical patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uninteional Behavior

A

Unintentional behavior involves actions that occur due to human error or accidents. This can encompass misconfigurations, accidental data leaks, or actions taken by users who have been tricked by social engineering attacks. Unintentional behavior can be caused by a lack of awareness or insufficient training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Guidance and Training

A

For effective security awareness training, there are several elements to consider. These elements include policy/handbooks, situational awareness, insider threats, password management, removable media and cables, social engineering, operational security, and working in a hybrid/remote working role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Situational awareness:

A

Situational awareness is about identifying potential threats and vulnerabilities, understanding the consequences of actions, and making informed decisions to minimize risks. Consistent training can improve users’ capacity to maintain a heightened state of situational awareness and equip them with the skills necessary to avoid cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User guidance and training method

A

Policy/handbooks: Training material
Situational awareness: A training aid for a job role
Insider threat: A disgruntled employee causing damage
Password management: Best practice for passwords
Removable media and cables: Attack vectors
Social engineering: Catching users unaware
Operational security: Looking at social engineering attacks
Hybrid/remote work environments: Working in remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reporting and monitoring

A

Initial: Evaluating training effectiveness
Recurring: Retraining if staff’s guard is lowered
Development: Creating training materials
Execution: Delivery of training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what port number is HTTPS

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Bcrypt used for?

A

Key streching algorthim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Open Vulnerability and Assessment Language (OVAL)

A

This is an XML-based schema designed to describe the security state of a system and query information related to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Puppet Forge

A

Puppet Forge is for implementing baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Technical Implementation Guide (STIG

A

: STIG is a comprehensive repository of cybersecurity guidelines and best practices curated by the United States Department of Defense (DoD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Site Suvery

A

These surveys involve a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves. A site survey will help to determine the best places to install the wireless access points that users connect to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Captive Portal

A

: A captive portal can be used to control access to a WAP. For example, when you join the wireless network at the airport, you are connected to the free Wi-Fi, yet you cannot access the internet right away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BLE

A

BLE prioritizes energy efficiency and uses random-generated device addresses to prevent tracking and identification. This makes it the first choice for a wide range of applications where conserving battery life is critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EAP-TLS

A

EAP-TLS is a specific, secure version of wireless authentication that requires a certificate stored on the endpoint (client or device) to verify identity and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TLS

A

TLS is a cryptographic protocol that provides end-to-end security of data sent between applications over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Simple Network Management Protocol (SNMP),

A

is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Turnsitle

A

This is a rotating gate that permits one person to pass at a time and is often used for crowd management and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NIST SP 800-500

A

This is a key standard that acts as the foundation for cybersecurity measures and has some unique features. It offers a vast catalog of security controls and safeguards, covering a wide range of security areas, from access control to incident response.

24
Q

ISO/IEC 27017

A

the standard for cloud security, focusing on information security controls for cloud services. It provides cloud-specific guidelines for both Cloud Service Providers (CSPs)

25
Q

ISO/IEC 27018

A

This is a vital standard for cloud computing, specifically addressing data privacy concern

26
Q

Playbooks

A

Playbooks are a subset of procedures that are often used in specific contexts such as sales, marketing, disaster recovery, or incident response. They are comprehensive guides that outline actions, strategies, and contingencies for various scenarios.

27
Q

Continous risk assesments

A

Continuous risk assessment goes above and beyond the periodic nature of recurring assessments, characterized by real-time monitoring and the analysis of risks.

28
Q

Recurring assesments

A

Recurring assessments are routine and scheduled to occur at predetermined intervals.

29
Q

Qualitavtive Risk

A

Qualitative risk analysis uses subjective judgment to categorize risks as high, medium, or low, focusing on the potential impact, such as the likelihood of occurrence

30
Q

Single loss expentcty

A

SLE represents the monetary value of the loss of a single item. Losing a laptop worth $1,000 while traveling, for instance, implies an SLE of $1,000.

31
Q

Annualized Rate of Occurrence (ARO)

A

ARO refers to the number of items lost annually. For example, if an IT team experiences the loss of six laptops in a year, the ARO is 6.

32
Q

Annualized Loss Expectancy (ALE)

A

Annualized Loss Expectancy (ALE): This is calculated by taking the SLE and multiplying it by the ARO and represents the total expected loss per year, providing a foundation for insurance and risk management decisions.

33
Q

Exposure Factor (EF)

A

EF is a measure of the magnitude of loss or damage that can be expected if a risk event occurs

34
Q

KRIs

A

KRIs are an essential element of a risk register. They serve as metrics that provide an early signal of increasing risk exposure in various areas of the organization. KRIs

35
Q

Risk threshold

A

The risk threshold represents the level of risk that an organization is willing to accept or tolerat

36
Q

IMAP

A

method of accessing email - port 143

37
Q

SSL/TLS PORT

A

443- used to encyprt communcation used with HTTPS

38
Q

LDAP

A

is a vendor-neutral software protocol used to lookup information or devices within a network PORT NUMBER 389

39
Q

SMB

A

Messasging for files and printers. Port 385

40
Q

asymmertic algorthims

A

asymmetric algorithms include RSA, Diffie–Hellman, and Elliptic Curve Cryptography (ECC

41
Q

symmetric algorithms

A

Data Encryption Standard (DES—56 bit), the Triple Data Encryption Standard (3DES—168 bit), and the more popular Advanced Encryption Standard (AES—256 bit

42
Q

Secure enclave

A

A secure enclave is a hardware-based security feature found in modern processors, such as Apple’s T2 chip

43
Q

Inline devices

A

Inline devices are placed directly in the data path of network traffic.

44
Q

Passive devices

A

Passive devices are observers. They monitor network traffic, analyze patterns, and provide insights into potential threats and vulnerabilities.

45
Q

Raid 1

A

RAID 1 (Mirroring)

•	Description: Duplicates (mirrors) data on two or more disks.
•	Advantages:
•	Provides redundancy. If one disk fails, data is still accessible from the other disk(s).
•	Disadvantages:
•	Storage capacity is halved since data is duplicated.
•	Use Case: Critical data storage where data redundancy is essential, such as in database systems.
46
Q

Fault tolerance

A

Fault tolerance is the ability of a system, particularly a computer or network system, to continue operating properly in the event of the failure of some of its components. In other words, a fault-tolerant system can tolerate faults (or errors) and continue to function without interruption or data loss.

47
Q

Confidential Data

A

Confidential data: Research and Development (R&D) and legal data are classified as confidential data as disclosure would cause damage to the company. They have strict legal protection, an example of which is attorney-client privilege. Access to confidential data typically requires authorization or special permission.

48
Q

Obfuscation

A

Obfuscation: Obfuscation is a technique used to make source code or data deliberately more complex or obscure, preventing theft by making it harder to understand.

49
Q

ROT13 Obfuscation

A

ROT13: ROT13 is a logical operation that means rotate by 13 places and is a variation of the Caesar cipher. As there are 26 letters in the alphabet, the letters are rotated 13 times. The key to ROT13 would be as follows:

50
Q

Managerial Controls

A

Managerial controls play a pivotal role in reducing risks within an organization. They encompass the implementation of policies, procedures, and practices by management to guide and direct the activities of individuals and teams. Through effective planning, organizing, and performance monitoring, managerial controls ensure that employees are aligned with the organization’s goals, thereby minimizing the potential for risks and enhancing overall operational safety.

51
Q

Operational Controls

A

Operational controls revolve around the execution of day-to-day activities and processes necessary for delivering goods and service

52
Q

PAM

A

PAM is a solution designed for stricter control over administrative accounts within a domain. It helps prevent privilege escalation and enhances security for privileged accounts.

53
Q

Data stewards

A

Data stewards are dedicated to maintaining data quality, diligently identifying and rectifying errors and inconsistencies.

54
Q

Spilt Brain

A

Split brain is a state of a server cluster where nodes diverge from each other and have conflicts when handling incoming I/O operations

55
Q

Expousre factor

A

EF): EF is a measure of the magnitude of loss or damage that can be expected if a risk event occurs

56
Q

RDP

A

Remote Desktop Protocol (RDP)

3389

57
Q

RDP

A

Remote Desktop Protocol (RDP)

3389