ISC2 - Study Notes 18 Flashcards

1
Q

Perimeter barriers such as fences and bollards outside the building and locked doors inside the building

Mantraps that control how many people can enter the restricted area at a time and help prevent tailgating

Cameras that can record all activity for any area of interest

Lighting to illuminate potential areas where intruders may try to break into a building

Access badges that personnel wear while inside secure areas

Primary and backup power sources, such as generators and uninterruptible power systems

Heating, ventilation, and air conditioning systems that control temperature and humidity

A

Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policies are authoritative in nature and provide overall direction. Standards are established norms, which can influence policies. Guidelines and procedures are derived from policies. Guidelines provide recommendations but are not authoritative. Procedures provide individuals with specific action steps to accomplish tasks.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

??? helps an organization prepare for emergencies that can interrupt the mission of the business. The ??? uses a ??? to identify critical functions for an organization and then includes plans to keep these critical functions operating. A ??? identifies steps to recover critical systems after a disaster.

Change control helps prevent unintended outages from occurring as a result of changes.

A

BCP / BCP / BIA / DRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ensures that information about a system’s configuration is available and helps ensure that similar systems are configured similarly. ??? also ensures the system can later be checked and compared to the baseline to ensure that it hasn’t been reconfigured.

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Choose your own device (CYOD) is similar to BYOD, but employees can only connect devices on a preapproved list. Organizations purchase the devices and issue them to employees when using a corporate-owned, personally enabled (COPE) policy.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two significant risks related to USB devices are data leakage and infection with malware. Losses due to data leakage can be mitigated by encrypting data at rest. Malware infections can be mitigated with antivirus software.

A

USB Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A thin client has very little hardware and only minimal software installed on it. It connects over a network to a server for all its data and applications. If the thin client is stolen, no data is lost. ex : VDI is a thin client. In contrast, a computer with an operating system and applications is a thick client.

full device encryption, this helps prevent attackers from accessing data on stolen or lost devices.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

includes a unique RSA asymmetric key (called an endorsement key), which the manufacturer embeds into the ??? before shipping it. When users enable the ???, it creates a storage root key, which encrypts application keys. Applications (such as Microsoft BitLocker) create application keys to encrypt an entire disk. Note that it doesn’t encrypt the entire disk drive. Instead, it partitions the disk drive into separate disks. The BitLocker partition remains unencrypted, but BitLocker encrypts the other partition where the data resides.

A

TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses two or more disks in an array to improve the performance of both read and write operations. However, ??? does not provide any fault tolerance. If one drive in a ??? disk subsystem fails, the entire array fails.

A

RAID-0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uses two disks in a mirror configuration. Each file is written completely to each drive in the array. If one of the drives ever fails, the other drive still includes complete copies of all of the files.

A

RAID-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly