ISC2 - Study Notes 1 Flashcards

1
Q

You can also use audit logging for system integrity. An audit log tracks changes to a resource, including what was changed, who changed it, and when. A set of one or more audit logs creates an audit trail that you can use to verify whether the configuration of a system is the same or has been modified. If someone did make a change that caused an outage, investigators can use audit logs to identify what was changed and who made the change.

A

Audit Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

uses multiple servers and ensures that a service will remain available, even if a server fails.

A

Failover clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a security principle that ensures that no single person has complete control over a process.

also provide nonrepudiation.

A

Separation of duties / Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

user provides credentials (such as a username and password) that are checked against a database to prove the user’s identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Administrators assign rights and permissions to resources, which ??? users to access the resources.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to the investigative steps that an organization takes prior to taking on something new, such as signing a contract or making a major purchase.

A

Due Diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the practice of implementing security policies and practices to protect resources. It ensures that a certain level of protection is applied to protect against losses from known risks. The goal is to reduce the risk to the resources to a manageable level.

A

Due Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the process of users proving they are who they claim to be. A common method is by having a user provide a logon name to profess an identity and then using a password for authentication.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

??? passwords are used only once per session. Many hardware tokens generate new passwords every 60 seconds that users can enter as a one-time password.

A

One-time or Dynamic Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information that a user would know, such as the name of a first pet, a first employer, and a favorite color, is combined to create a ???.

A

Cognitive Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly