ISC2 - Study Notes 7 Flashcards

1
Q

refers to the privileges granted to users, and following the principle of least privilege.

A

Entitlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Removing a user from a group immediately removes all the privileges assigned to the user as a member of that group. If processes aren’t in place to monitor entitlement, users end up having more privileges than they need to perform their jobs.

A

info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to disabling and deleting inactive accounts. At a minimum, inactive accounts need to be disabled. When it’s determined that the account is no longer needed, it should be deleted.

A

Account de-provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Layer : data arrives as BITS (ones and zeros)

Data Link Layer : packages data in FRAMES.

Data traveling on the Network layer is packaged and transmitted as PACKETS.

Data traveling on the Transport layer is packaged and transmitted as SEGMENTS.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

use radio frequency transmissions to broadcast signals over the air. Because they travel over the air, they are the easiest to intercept.

A

Wireless Transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Twisted pair This is the most commonly used media for data transmissions. Unshielded twisted pair (UTP) does not have shielding and is susceptible to electromagnetic interference (EMI) and radio frequency interference (RFI). Shielded twisted pair (STP) provides protection against EMI and RFI.

A

Cable Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Coaxial cable is similar to the cable used for cable television.

The Logical Link Control sublayer interacts with the Network layer.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routers use access control lists (ACLs) for basic packet filtering to control traffic. An ACL can block or allow traffic based on IP addresses, logical ports, and even some protocols such as Internet Protocol security (IPsec, identified with protocol numbers 50 and 51).

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Session layer establishes and maintains sessions between applications or software processes on the local and remote systems. It keeps the session information for one application separate from the session information from other applications. Remote Procedure Call (RPC) is one of the few protocols that operates directly on this layer. Applications can use RPC to request a service from an application running on a different computer. Data traveling on the application, presentation, and session layers is packaged and named protocol data units (PDUs).

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

standardizes data presentation for the application layer. Some data encryption and decryption occurs at this layer. Additionally, data can be compressed and decompressed at this layer for better network performance.

A

The Presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly