Installation and Deployment Flashcards

1
Q

According to ITIL, the goal of configuration management is

A

To enable the control of the infrastructure by monitoring and maintaining information on all the resources that are necessary to deliver services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some of the necessary pre- and post-installation configuration management security considerations include:

A

Hardening; Environment Configuration; Release Management; Bootstrapping and Secure Startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening includes the processes of

A

Locking down a system to the most restrictive level so that it is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardening is effective in its

A

Defense against vulnerabilities that result from insecure, incorrect, or default system configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A MSB are set up to comply with

A

Minimum Security Baseline are set up to comply with the organizational security policies and help in
supporting the organization’s risk management efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening of software involves

A

The setting the necessary and correct configuration settings and architecting the software to be secure by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some of the common examples of security misconfigurations include:

A

Hard coding credentials and cryptographic keys inline code or in configuration files in cleartext; Not disabling the listing of directories and files in a web server; Installation of software with default accounts and settings; Installation of the administrative console with default configuration settings; Installation or configuration of unneeded services, ports and
protocols, unused pages, and unprotected files and directories; Missing software patches; Lack of perimeter and host defensive controls such as firewalls, filters, etc; Enabling tracing and debugging can lead to attacks on confidentiality assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of software hardening (code centric) include:

A

Removal of maintenance hooks before deployment; Removal of debugging code and flags in code; Modifying the instrumentation of code to not contain any sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardening is a very important process in the which phase of software development

A

Hardening is a very important process in the installation phase of software development and proper attention must be given to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order for the software to function, it is granted administrative rights when installed. Which security principles are violated.

A

Least privilege (granted administrative rights); defense in depth (enabling disabled services, ports and protocols); separation of duties (when operations personnel allow developers access to production systems to install software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Additional configuration considerations include:

A

Test and default accounts need to be turned off; Unnecessary and unused services need to be removed in all environments; Access rights need to be denied by default and granted explicitly even in development and test environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Release management is the process of

A

ensuring that all changes that are made to the
computing environment are planned, documented, thoroughly tested and deployed with least privilege, without negatively impacting any existing business operations, customers, end-users or user support teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To manage software configuration management properly, one of the first things to do is to

A

To document and maintain the configuration information in a formal and structured manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The implementation, documentation, tests, project related documentation, tools including build tools are maintained in a configuration management system (CMS) required by stardard

A

ISO/IEC 15408 (Common Criteria)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Booting or bootstrapping

A

The sequences of events and processes that self-start the system to a preset state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Booting processes in general are also sometimes referred to as

A

The Initial Program Load (IPL).

17
Q

POST

A

Power-on self-test is the first step in an IPL.

18
Q

POST is an event that needs to be protected from

A

Being tampered.

19
Q

How to ensure that there is no information disclosure from the memory.

A

The BIOS can perform what is known as a destructive memory check during POST.

20
Q

Secure startup

A

All the processes and mechanism that assure the

environment’s TCB integrity when the system or software running on the system starts.

21
Q

TPM

A

Trusted Platform Module - it provides heightened tamperproof data protection during startup.

22
Q

The TPM chip can be used for

A

storing cryptographic keys and provide identification information from mobile devices for authentication and access management.

23
Q

How to determine the integrity of the system’s bootstrapping process.

A

TPM fingerprint

24
Q

Cold boot attack

A

The system shutdown and bootstrapping process can

be circumvented and sensitive information can be disclosed.

25
Q

Interrupt the bootstrapping process and interject themselves as the program loads. Which Malicious Software?

A

Malicious Software (Malware) threat agents such as spyware and rootkits.