Domain 7 Flashcards
__ determines the MTD e.g. this server can only be down for 4 hours.
BIA (Business Impact Analysis) determines the MTD (Maximum Tolerable/Allowable Downtime)
__ firewall is software-based and filters anything coming into or leaving your system e.g. Windows firewall, ZoneAlarm (Windows), Application Firewall (Mac OS X)
Host-based firewall
__ firewalls are referred to as ACLs (Access Control Lists) on some devices.
Packet filtering firewall. It inspects layer 3 IP header and is not very secure.
__ firewalls maintain a state table so they can allow a syn ack only if there was a corresponding syn. They are primarily focused on layers 3 and 4.
Stateful inspection firewall. Looks at port while inspecting Layer 4 TCP/UDP header
__ focuses on dynamically provisioning resources to cloud services e.g. providing computing resources of anywhere from 1 to thousands of systems within minutes such as Amazon during Nov/Dec. Organizations typically pay per unit, not per virtual host (based on equivalent CPU capacity).
Elastic Cloud Computing
__ host discovery is the most direct way to identify a host, typically with a simple ping sweep. An additional stimulus beyond ICMP Echo Request is required for hardened systems.
active
__ Intrusion __ System can take measures on its own to control and minimize damage such as spoofing a reset to both sides of the connection. This will drop the connection to control the damage. It can also use an API to tell the firewall to block an IP address.
Active IDS can take measures on its own to control and minimize damage.
__ IDS sends an alert but does not stop attack. __ IDS stops the attack, usually be sending resets.
passive, active
__ is a client service such as client email like Gmail.
SaaS (Software as a Service)
__ is a cloud-based VPS such as a Linux server
IaaS (Infrastructure as a Service), VPS (Virtual Private Server)
__ is a passive sniffer/sensor for analyzing and alerting on attacks whereas __ is an inline device that can block and stop attacks.
IDS, IPS
__ is a plan that provides detailed steps to restore critical information systems and data.
DRP (Disaster Recovery Plan)
__ is a plan to avoid irreparable loss of mission critical operations.
BCP (Business Continuity Planning)
__ is a server service such as Apache web service.
PaaS (Platform as a Service). Admins have control over the service config only, not the general OS e.g. can restart the web service but not the entire system.
__ is a strategic ongoing plan focused on business processes with the goal of proactively fixing potential problems. It is an ongoing, strategic and over-arching plan.
BCP (Business Continuity Planning)
__ is a subcomponent of BCP that is a reactive plan focused on recovery when normal business operations are interrupted.
DRP (Disaster Recovery Plan)
__ is a type of data redundancy that is similar to remote journaling but provides additional robust backup by storing duplicate data on multiple remote storage devices.
Database shadowing: similar to journaling but stored on multiple devices
__ is a type of testing where team members step through the plan looking for errors or false assumptions.
structured walkthrough testing or validity testing
__ is how long a system/process can be down before the mission is impacted.
RTO (Recovery Time Objective)
__ is how long the business will allow a disruption of mission critical functions.
MTD (Maximum Tolerable Downtime)
__ is primarily concerned with evidence and proving in court whether or not someone did something.
Forensics
__ planning is short-term focused (has a stop and start) while __ planning is long-term focused (continuous)
DRP, BCP
__ software focuses on worms and viruses. __ might bundle the functionality of antispyware, HIPS, application whitelisting, antivirus.
antivirus, antimalware
__ testing involves actually failing over operations to an alternate computing facility.
full interruption testing
__ testing is a recovery to an alternate site with the main site still active
parallel testing involves actual recovery at an alternate computing facility but while normal operations are still maintained at the primary location.
__ testing is simply reviewing the plan to ensure all areas are covered.
read-through testing, checklist testing or consistency testing
__, __ and __ firewalls are all single connection while __, __ and __ firewalls are 2 connections.
Packet, Stateful, NGFWs are single connection. Application, Application-Level and Circuit Proxy are 2 connection firewalls.
__is a subcomponent of BCP focused on rapid restoration of mission critical functions.
COOP (Continuing Operations Plan)
A __ backup copies only files that have changed since the last full backup was last performed.
Differential backup
A __ backup is the most efficient type of backup because it backs up the least amount of data each day.
Incremental backup
A __ backup is used if time and tape space is at an extreme premium, and usually resets the archive bit on the files after they have been backed up.
Incremental backup
A __ firewall develops a virtual connection between the host and destination, and typically sits at the session layer.
Circuit-Level Proxy Firewall, does NOT use application-level proxy software.
A __ firewall hides the origin of a packet and is implemented on a computer by using proxy server software.
Application-Level Proxy Firewall
A __ firewall is slower but more effective than a packet filtering firewall, and inspects ports.
SI (Stateful Inspection) firewall. Looks at port while inspecting Layer 4 TCP/UDP header
A __ firewall is the slowest of all firewalls since it fully analyses the entire packet, going all the way up to layer 7 and then back down to layer 1.
Proxy firewall (or ‘Application proxy’ because it processes packets at all 7 layers). Breaks the connection into two pieces
A __ firewall maintains one TCP connection with the client and one with the server.
Proxy firewall (or ‘Application proxy’ because it processes packets at all 7 layers). Breaks the connection into two pieces
A __ is a system directly connected to the internet such as a firewall or router. It is directly exposed to attack.
Bastion host e.g. web, mail, FTP servers. A host computer in the public area or DMZ that is exposed to attack from the Internet.
A __ testing is a walkthrough test that involves specific mock-up scenarios.
simulation or tabletop testing: team members respond as if an emergency is occuring. You may recover locations (emergency operations center and alternate sites) and enable communications liks while team members execute recovery steps in walk-through manner however you do not actually perform recovery actions (restore backups).
A __ will run an executable in a sandbox before being run on the client to make sure it does not do any damage.
MDD (Malware Detonation Device) or Sandboxing
A cloud-based service such as an Apache web service would be considered what?
PaaS (Platform as a Service). Admins have control over the service config only, not the general OS e.g. can restart the web service but not the entire system.
A device that continuously monitors web server logs, firewall and proxy logs, system and event logs and many others is __. It is detective
SIEM (Security Information and Event Management)
A false positive on __ which alerts on matching signatures can be an annoyance. A false positive on __ is a self-imposed DoS condition since it will block the traffic. This can potentially block business / revenue therefore false positives cannot be allowed in the config for this type of system.
IDS, IPS cannot allow false positives
A firewall that uses 2 separate connections with the best security is __ firewall.
Application Proxy firewall, processes packets at all 7 layers
A formalized agreement between two business entities to faciliate recovery after a disaster.
reciprocal agreement
A honey__ is a server, Honey__ is a network. Honey__ is a file.
honeypot (server), honeynet (network), honey token (file)
A inline device that is only alerting is an Intrusion __ System.
Prevention since inline, even though it is only alerting. The difference is how it is deployed.
A major patch was released that exploits 99% of your systems. You received approval from executives to patch it even though the next CCB meeting isn’t until next week. What is the next step?
Present it at the next CCB meeting. Everything needs to be tracked in the CMDB (Change Management Database)
A single connection firewall with the best security?
NGFW (Next Generation Firewall)
A tangible object or physical evidence is known as __ evidence.
real evidence
According to __ you can stop 80% of all attacks with which 4 items.
ASD (Austrailian Signals Directorate): patching OS, patching applications, application whitelisting, limiting and controlling admin access
An oral testimony by a witness would be an example of __ evidence.
Direct
__ includes a focused vulnerability assessment to determine the weaknesses to the business process that has to be recovered (smaller than full risk assessment).
BIA (Business Impact Analysis)
Block-level striping is done at RAID __.
RAID 4,5,6
Burden of proof for criminal action is __.
Beyond a shadow of a doubt or beyond a reasonable doubt
Does RAID guarantee that if one drive fails, you will not lose information?
No because of RAID 0 which is for performance; RAID 1 and higher do meet that requirement.
During an evacuation the __ is typically the first one out and responsible for beginning the process of accounting for all employees.
meeting point leader