IS3110 CHAP 2 Flashcards
What is a security policy?
- A rigid set of rules that must be followed explicitly to be effective
- A technical control used to enforce security
- A physical control used to enforce security
- A document created by senior management that identifies the role of security in the organization
A document created by senior management that identifies the role of security in the organization
You want to ensure that users are granted only the rights to perform actions required for their jobs. What should you use?
- Principle of least privilege
- Principle of need to know
- Principle of limited rights
- Separation of duties
Principle of least privilege
You want to ensure that users are granted only the persuasions needed to access data required to perform their jobs. What should you use?
- Principle of least privilege
- Principle of need to know
- Principle of limited rights
- Principle of limited permissions
Principle of need to know
Which of the following security principles divides job responsibilities to reduce fraud?
- Need to know
- Least privilege
- Separation of duties
- Mandatory vacations
Separation of duties
What can you use to ensure that unauthorized changes are not made to systems?
- Input validation
- Patch management
- Version control
- Configuration management
Configuration management
What are two types of intrusion detection systems?
- Intentional and unintentional
- Natural and manmade
- Host-based and network-based
- Technical and physical
Host-based and network-based
A technical control prevents unauthorized personnel from having physical access to a secure area or secure system.
TRUE OR FALSE
FALSE
What allows an attacker to gain additional privileges on a system by sending unexpected code to the system?
- Buffer overflow
- MAC flood
- Input validation
- Spiders
Buffer overflow
What is hardening a server?
- Securing it from the default configuration
- Ensuring it cannot be powered down
- Locking it in a room that is hard to access
- Enabling necessary protocols and services
Securing it from the default configuration
Which of the following steps could be taken to harden a server?
- Removing unnecessary services and protocols
- Keeping the server up to date
- Changing defaults
- Enabling local firewalls
- All the above
All the above
Which government agency includes the Information Technology Laboratory and published SP 800-30?
- NIST
- DHS
- NCSD
- US-CERT
NIST
ITL and ITIL are different names for the same thing.
TRUE OR FALSE
FALSE
Which US government agency regularly publishes alerts and bulletins related to security threats?
- NIST
- FBI
- US-CERT
- The MITRE Corporation
US-CERT
The CVE list is maintained by ___?
The MITRE Corporation
What is the standard used to create Information Security Vulnerability names?
- CVE
- MITRE
- DISA
- CSI
CVE
The amount that can be attacked on a server. Every additional service or protocol running or enabled increased the surface. By disabling services or protocols that are not needed, you reduce the surface
ATTACK SURFACE
A common exploit used against public-facing servers. Buffer overflow can occur when an attacker sends more data or different data than is expected. Attackers can use it to gain additional privileges on the system
BUFFER OVERFLOW
Standards used to ensure that systems are configured similarly. Additionally, you can perform compliance auditing regularly to ensure that systems have not been improperly modified.
CONFIGURATION MANAGEMENT