Fundamentals of Security Flashcards
1.1 - Compare and contrast various types of security controls 1.2 - Summarize fundamental security concepts
What is the primary focus of Information Security?
A. Protecting systems from physical damage.
B. Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
C. Managing user permissions within a network.
D. Ensuring data remains unaltered and accessible when needed.
Answer:
B. Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
Why correct: Information Security focuses on protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
Incorrect Options:
A: This describes physical security, not Information Security.
C: This relates to access control, which is a subset of security practices.
D: While integrity and availability are part of Information Security, the primary focus is broader.
What does Non-Repudiation ensure in Information Security?
A. Information is only accessible to authorized personnel.
B. Data remains accurate and unaltered.
C. An action or event cannot be denied by the involved parties.
D. Information and resources are accessible when needed.
C. An action or event cannot be denied by the involved parties.
Why correct: Non-Repudiation guarantees that actions or events cannot be denied by the involved parties, typically through mechanisms like digital signatures.
Incorrect Options:
A: This describes Confidentiality.
B: This describes Integrity.
D: This describes Availability.
What are the two additional principles added to the CIA Triad in the CIANA Pentagon?
A. Integrity and Availability
B. Authentication and Non-Repudiation
C. Confidentiality and Authorization
D. Accounting and Adaptive Identity
Answer:
B. Authentication and Non-Repudiation
Why correct: The CIANA Pentagon extends the CIA Triad by adding Authentication (verifying user/system identity) and Non-Repudiation (ensuring actions/events cannot be denied).
Incorrect Options:
A: Integrity and Availability are already part of the CIA Triad.
C: Authorization is not part of the CIANA Pentagon.
D: Adaptive Identity is a component of the Zero Trust model.
What is the role of Authentication in the Triple A’s of Security?
A. Tracking user activities and resource usage.
B. Determining what resources a user can access.
C. Verifying the identity of a user or system.
D. Protecting information from unauthorized access.
Answer:
C. Verifying the identity of a user or system.
Why correct: Authentication involves verifying the identity of a user or system, such as through password checks.
Incorrect Options:
A: This describes Accounting.
B: This describes Authorization.
D: This is the goal of Information Security, not specifically Authentication.
Which of the following is NOT a category of Security Controls?
A. Technical
B. Physical
C. Directive
D. Logical
Answer:
D. Logical
Why correct: The categories of Security Controls are Technical, Managerial, Operational, and Physical. Logical is not a category.
Incorrect Options:
A, B, C: These are all valid categories of Security Controls.
Which principle is central to the Zero Trust Model?
A. Trust is granted to internal users by default.
B. No one should be trusted by default, regardless of origin.
C. Users must always be authenticated only once.
D. Authentication and Authorization are not required.
Answer:
B. No one should be trusted by default, regardless of origin.
Why correct: The Zero Trust Model operates on the principle that no one, whether inside or outside the network, should be trusted by default.
Incorrect Options:
A: Trust is not granted by default in Zero Trust.
C: Authentication is continuous in Zero Trust.
D: Authentication and Authorization are critical in Zero Trust.
Which of the following Security Control Categories protects material assets?
A. Managerial
B. Physical
C. Technical
D. Operational
B. Physical
Explanation:
Correct Answer: Physical security controls protect tangible assets, such as buildings and hardware, from unauthorized access or damage.
Incorrect Options:
A: Managerial controls are focused on policies, procedures, and risk assessments.
C: Technical controls rely on technology to enforce security.
D: Operational controls focus on day-to-day security tasks.
Which of the following is a Preventative Security Control?
A. A firewall blocking unauthorized access to a network.
B. A surveillance camera recording activity.
C. A backup system restoring lost data.
D. A user awareness training program.
A. A firewall blocking unauthorized access to a network.
Explanation:
Correct Answer: Preventative controls are designed to stop incidents before they occur, such as a firewall blocking unauthorized network access.
Incorrect Options:
B: Surveillance cameras are Detective controls, as they help identify and monitor events.
C: A backup system restoring lost data is a Corrective control.
D: User awareness training is a Directive control.
Which Security Control Type aims to discourage malicious activities?
A. Preventative
B. Deterrent
C. Detective
D. Corrective
B. Deterrent
Explanation:
Correct Answer: Deterrent controls, such as warning signs or guard presence, aim to discourage malicious activities by creating the perception of difficulty or risk.
Incorrect Options:
A: Preventative controls actively block unauthorized activities.
C: Detective controls are used to identify incidents after they occur.
D: Corrective controls are used to fix or recover from incidents.
Which Security Control Type is responsible for identifying incidents that have already occurred?
A. Preventative
B. Deterrent
C. Detective
D. Directive
C. Detective
Explanation:
Correct Answer: Detective controls, such as intrusion detection systems or log monitoring, help identify and record incidents after they occur.
Incorrect Options:
A: Preventative controls stop incidents before they happen.
B: Deterrent controls discourage malicious behavior.
D: Directive controls provide guidance or instructions to enforce security policies.
Which type of Security Control is used to restore systems to normal after an incident?
A. Corrective
B. Preventative
C. Compensating
D. Detective
A. Corrective
Explanation:
Correct Answer: Corrective controls, such as patch management or restoring from backups, are used to recover from and mitigate the effects of a security incident.
Incorrect Options:
B: Preventative controls block incidents from occurring.
C: Compensating controls are alternative measures to meet a security requirement.
D: Detective controls identify incidents.
Which Security Control Type serves as an alternative measure when a primary control is not feasible?
A. Preventative
B. Compensating
C. Directive
D. Corrective
B. Compensating
Explanation:
Correct Answer: Compensating controls provide an alternative way to achieve security objectives when the primary control is not feasible, such as using multifactor authentication when biometric authentication is unavailable.
Incorrect Options:
A: Preventative controls block incidents from occurring.
C: Directive controls enforce policies and procedures.
D: Corrective controls recover from incidents.
Which Security Control Type provides guidance to ensure compliance with security policies?
A. Preventative
B. Directive
C. Detective
D. Corrective
B. Directive
Explanation:
Correct Answer: Directive controls, such as security policies and procedures, provide guidance to ensure compliance and proper implementation of security measures.
Incorrect Options:
A: Preventative controls block incidents.
C: Detective controls identify incidents.
D: Corrective controls recover from incidents.
What is the fundamental principle of the Zero Trust Model?
A. Grant access by default to trusted devices.
B. No one is trusted by default, even within the network.
C. Rely solely on external firewalls for protection.
D. Trust but verify all access requests.
B. No one is trusted by default, even within the network.
Explanation:
Correct Answer: The Zero Trust Model operates on the principle of “never trust, always verify,” requiring strict access verification for all users, devices, and systems, regardless of their location.
Incorrect Options:
A: The Zero Trust Model avoids granting access by default, even to trusted devices.
C: External firewalls alone are insufficient for Zero Trust.
D: Zero Trust advocates “never trust,” not “trust but verify.”
Which component of the Data Plane is responsible for enforcing access decisions?
A. Policy Engine
B. Subject/System
C. Policy Enforcement Point
D. Policy Administrator
C. Policy Enforcement Point
Explanation:
Correct Answer: The Policy Enforcement Point is where the access decision is executed, either granting or denying the request based on policy.
Incorrect Options:
A: Policy Engine cross-references access requests with policies but does not enforce them.
B: Subject/System is the entity attempting access.
D: Policy Administrator manages access policies but does not enforce them.
Which of the following is not part of the Control Plane in the Zero Trust Model?
A. Threat Scope Reduction
B. Secured Zones
C. Policy Enforcement Point
D. Policy-Driven Access Control
C. Policy Enforcement Point
Explanation:
Correct Answer: Policy Enforcement Point is part of the Data Plane, responsible for executing access decisions.
Incorrect Options:
A, B, D: These are all part of the Control Plane, focusing on defining and managing policies.
What is a threat in the context of information security?
A. A weakness in system design or implementation.
B. Anything that could cause harm, loss, or compromise to IT systems.
C. The absence of physical security controls.
D. A missing security patch in software.
B. Anything that could cause harm, loss, or compromise to IT systems.
Explanation:
Correct Answer: A threat refers to anything, such as natural disasters, cyber-attacks, or data breaches, that could cause harm to information technology systems.
Incorrect Options:
A, C, D: These describe vulnerabilities, which are weaknesses in a system that could be exploited by a threat.
Which of the following is an example of a vulnerability?
A. A hurricane causing a power outage.
B. A misconfigured software application.
C. A phishing attack targeting employees.
D. Disclosure of confidential information.
B. A misconfigured software application.
Explanation:
Correct Answer: Vulnerabilities are weaknesses in the system, such as misconfigured software, missing patches, or lack of physical security.
Incorrect Options:
A: A hurricane is a natural disaster and considered a threat.
C: A phishing attack is a type of cyber-attack and thus a threat.
D: Disclosure of confidential information is a threat outcome, not a vulnerability.
Where does risk exist in enterprise systems?
A. When a threat exists without a matching vulnerability.
B. When a vulnerability exists but there’s no matching threat.
C. When threats and vulnerabilities intersect.
D. When there are no threats or vulnerabilities.
C. When threats and vulnerabilities intersect.
Explanation:
Correct Answer: Risk arises when there is both a threat and a matching vulnerability that could be exploited.
Incorrect Options:
A, B: Risk does not exist when there is no intersection between threats and vulnerabilities.
D: Risk requires both threats and vulnerabilities to exist simultaneously.
Which of the following is not an example of a vulnerability?
A. A software bug.
B. A missing security patch.
C. A cyber-attack exploiting a network.
D. Improperly protected network devices.
C. A cyber-attack exploiting a network.
Explanation:
Correct Answer: A cyber-attack is a threat, not a vulnerability.
Incorrect Options:
A, B, D: These are examples of vulnerabilities, as they represent weaknesses in the system.
What is the primary goal of risk management in information security?
A. Eliminate all vulnerabilities in a system.
B. Minimize the likelihood of undesired outcomes.
C. Prevent all threats from occurring.
D. Ensure there are no risks in the system.
B. Minimize the likelihood of undesired outcomes.
Explanation:
Correct Answer: Risk management focuses on reducing the likelihood of undesired outcomes by addressing vulnerabilities and mitigating threats.
Incorrect Options:
A: It’s not feasible to eliminate all vulnerabilities completely.
C: Preventing all threats is impossible; risk management mitigates their impact.
D: Risk can never be fully eliminated, only minimized.
What is the primary focus of confidentiality in information security?
A. Ensuring data remains accurate and unaltered.
B. Protecting information from unauthorized access and disclosure.
C. Guaranteeing information and resources are accessible when needed.
D. Tracking user activities and resource usage.
B. Protecting information from unauthorized access and disclosure.
Explanation:
Correct Answer: Confidentiality refers to safeguarding private or sensitive information so that it is not accessible to unauthorized individuals, entities, or processes.
Incorrect Options:
A: This describes integrity, not confidentiality.
C: This refers to availability, not confidentiality.
D: This is related to accounting or audit, not confidentiality.
Which of the following is not a main reason why confidentiality is important?
A. To protect personal privacy.
B. To achieve regulatory compliance.
C. To prevent data from being altered.
D. To maintain a business advantage.
C. To prevent data from being altered.
Explanation:
Correct Answer: Preventing data alteration pertains to integrity, not confidentiality.
Incorrect Options:
A, B, D: These are valid reasons why confidentiality is crucial, as it ensures the protection of personal privacy, compliance with regulations, and retention of a competitive business advantage.
Which method involves obscuring specific data within a database while retaining its authenticity for authorized users?
A. Encryption
B. Access Controls
C. Data Masking
D. Physical Security Measures
C. Data Masking
Explanation:
Correct Answer: Data masking obscures specific data in a database to prevent unauthorized access while keeping the data usable for authorized purposes.
Incorrect Options:
A: Encryption converts data into a code, but it is not the same as data masking.
B: Access controls manage permissions but do not modify or obscure the data.
D: Physical security measures ensure physical protection but are unrelated to database-level data masking.
What is the purpose of access controls in ensuring confidentiality?
A. To obscure specific data in a database.
B. To convert data into an unreadable code.
C. To set up strong user permissions for authorized access.
D. To provide physical protection for data.
C. To set up strong user permissions for authorized access.
Explanation:
Correct Answer: Access controls ensure only authorized personnel can access specific types of data by establishing strong user permissions.
Incorrect Options:
A: Data masking obscures data but does not involve user permissions.
B: Encryption converts data into a code to prevent unauthorized access.
D: Physical security measures focus on securing physical assets, not access permissions.
Which of the following confidentiality methods addresses physical types of data, such as paper records?
A. Encryption
B. Access Controls
C. Physical Security Measures
D. Training and Awareness
C. Physical Security Measures
Explanation:
Correct Answer: Physical security measures protect both physical data (e.g., paper records) and digital information stored on servers or workstations.
Incorrect Options:
A: Encryption protects digital data by converting it into code but does not address physical assets.
B: Access controls are focused on user permissions, not physical protection.
D: Training and awareness involve educating employees rather than directly securing physical assets.
What is the primary purpose of conducting training and awareness programs in maintaining confidentiality?
A. To obscure specific data within a database.
B. To ensure employees are educated on security best practices.
C. To convert data into a code for unauthorized users.
D. To track user activities and audit their actions.
B. To ensure employees are educated on security best practices.
Explanation:
Correct Answer: Training and awareness ensure employees understand best practices for protecting their organization’s sensitive data.
Incorrect Options:
A: Data masking involves obscuring data but is unrelated to employee training.
C: Encryption converts data into code but is a separate confidentiality method.
D: Accounting tracks user activities and is unrelated to training programs.