Lesson 10 Flashcards

1
Q

Name the CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Keeping information private and protecting it from unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some things that maybe confidential

A

Trade Secrets
Personnel Records
Tax Records
Military Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Keeping information accurate, free from errors, and unauthorized modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Making sure that the resources are available for use by end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to ensure Integrity

A

Encryption

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to ensure Availability

A

SANS

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four security factors that most systems rely on

A

Authorization
Access Control
Accountability
Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

determining what rights and privileges an entity has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control

A

assigning privileges to various resources, objects or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accountability

A

Who to hold responsible for a particular activity or even such as a logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Auditing

A

process of tracking and recording system activities and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Non repudiation

A

goal of ensuring that data remains associated with the party that creates it or send a transmission with the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Least Privilege

A

users or software have only the minimal level of access that is necessary for them to perform their duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privilege Bracketing

A

to allow privileges only when needed and then revoke them as soon as the user finishes the task or the need has passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk

A

a concept that indicates exposure to the chance of damage or loss.

Likelihood of a hazard or threat occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Risk is often associated with

A

The loss of power
Loss of a device
Loss of the network
Other physical loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A disgruntled employee is a threat or vulnerability

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the determining factor when looking at information system security

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Unauthorized access

A

network of data access that is not explicitly approved by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name some acts of unauthorized access

A

Attack by an outsider

Misuse of privileges

Inadvertent actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does Unauthorized access result in data loss or damage

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Can unauthorized access lead to network attacks

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data Breach

A

Sensitive or protected data is copied transmitted viewed stolen or used by individuals unauthorized to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attacker

A

Malicious intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hacker

A

Possess skills to gain access to computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Security controls

A

safeguards to avoid counteract minimize security risks relating to personal or organizational property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Name some physical controls

A

Fences
doors
locks
fire extinguisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Name some procedural controls

A

incident response process

management oversight

security awareness

training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Name some technical controls

A

authentication

logical access

antivirus

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Name some legal and regulatory compliance controls

A

Privacy laws

Policies

Clauses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Security policy

A

statement that defines how security will be implemented within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This describes the means that the organization will take to protect the CIA of data and resources

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What determines the security policy

A

needs of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Without a formal policy you can only

A

react to threats instead of anticipating them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which policy may include a consent to monitor clause

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Consent to monitor banner normally states

A

You agree to be monitored

You are authorized to access or download specific data

You and the network owners have a reasonable expectation of privacy

You consent to reasonable law enforcement searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the components of a Security policy

A

Policy Statement

Standards

Guidelines

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What outlines the plan for the individual security component

A

Policy Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Defines how to measure the level of adherence to he policy

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Suggestions recommendation or best practices for how to meet the policy standard

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Step[ by step instructions that detail how to implement

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Name some common security policy types

A

Acceptable Use Policy

Audit Policy

‘Extranet Policy

Password Policy

Wireless Standards Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Name a Security Policy Standards Org

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

pg 258

A

pg 258

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are windows security policies

A

configuration settings within windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Where are windows security policies found

A

in a policy object in the computer configuration\windows settings\security settings node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Group policies cab be applied to single devices or users, to groups of devices or users, to all devices or users

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Group Policy

A

centralized account mgmt. for AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Permissions

A

security setting that determines the level of access a user or group account hat to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are somethings that may have permissions

A

printers
files
shared folders
directory databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Is it a good practice to assign rights and permissions to individual accts

A

NO

It is better to create group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

NTFS

A

NT File System

file level security

NTSF permission on folder are inherited by the files and subfoldrs within it

54
Q

What are the types of permissions

A

Read

Write

Read Execute

List Folder Contents

Modify

Full Control

Special permissions

55
Q

Name some Linux permissions types

A

R read
W write
x execute

56
Q

Can segmenting your network help you secure it

A

Yes

57
Q

How does segmentation help secure the network

A

decreasing the attack surface

58
Q

WJy segment the netwrk

A

Security
Compliance rqmts
Load balancing

59
Q

Zones are defined by physical or logical boundaries

A

True

60
Q

Does each zone have a security zone

A

Yes

61
Q

What allows you to communicate across zones

A

A conduit

62
Q

What should be segmented

A
SCADA/ICS
Legacy Systems
Private networks
Public Networks
Testing lab
Honey Net
63
Q

Honey Net or Pot

A

used to detect deflector counteract attempts at unauthorized use

64
Q

Wireless security is any method used to secure a wireless network from unauthorized access or data theft

A

T

65
Q

Site Survey

A

technique to determine the coverage area of a network

66
Q

Do WAPS and routers come with default SSIDs

A

Yes

67
Q

Can an SSID be changed

A

Yes

68
Q

Does disabling the SSID help secure a wireless network

A

Yes

The network cannot be seen by a potential attackers

69
Q

Can attackers still attack a network with a disabled SSID

A

Yes

70
Q

Disaster

A

Catastrophic loss of functionality that could have been easily prevented

71
Q

Disaster Recovery

A

Admin function of protecting people and resources

72
Q

What are the disaster recovery priorities

A

Safety of personnel is first followed ensuring continuity of business functions

73
Q

What are the types of disasters

A

Natural

Data Destruction

Hardware failure

74
Q

Data destruction includes

A

Accidental deletion

Malicious destruction

Virus attack

75
Q

How do you prevent data destruction

A

Good backups

76
Q

What is business continuity

A

planning that is used during serious incidents or disasters to ensure critical business functions

77
Q

What are the three key elements of Business Continuity

A

Resilience

Recovery

Contingency

78
Q

What is a single point of failure

A

if this fails it will break the network

79
Q

How do you combat a single point of failure

A

Employ redundancy

80
Q

Vulnerability

A

condition that leaves a device open to attack

81
Q

Can a device be vulnerable if there is no active threat against it

A

Yes

82
Q

Vulnerability Scanner

A

Scans network and websites for security risks and generate steps to remediation. Some can even do patching

83
Q

Name the physical security threats

A

Internal

External

Natural

Man Made

84
Q

Examples of external threats

A

attackers

power failure

85
Q

Name some environmental threats

A

Fire

Hurricanes and Tornadoes

Flood

Extreme Temperature

Extreme Humidity

86
Q

Should you run unnecessary services

A

No

87
Q

Open port

A

TCP or UDP port number that is configured to accept packets

88
Q

Unpatched Systems

A

systems without software updates

89
Q

Legacy Systems

A

device running an old OS

90
Q

Unencrypted Channels

A

connections in which the data being sent is not encrypted by using one or more unsecure protocols

91
Q

Clear text credentials

A

user passwords that are transmitted or stored unencrypted

92
Q

Unsecure Protocols

A

expose data or credentials in clear text

Telnet
HTTP
SLIP
FTP
TFTP
SNMP v1 and v2
93
Q

RF Emanation

A

emitting unintentional radio signals

94
Q

TEMPEST

A

NSA and NATO process to deal with RF emanations

95
Q

Name some threats

A

Changes to data

Interruption of services

Interruption of access

Damage to hardware

Unauthorized access or damage

96
Q

Name some types of attacks

A
Physical Security Attacks
Network attacks
Software attacks
Social Engineering attacks
Web app attacks
97
Q

Data Theft

A

using unauthorized access to obtain protected network info

98
Q

Data theft attacker often uses what in the attack

A

Stolen credentials to authenticate or stealing the data in transit by using a sniffer

99
Q

Social Engineering attack

A

uses deception to convince unsuspecting users to provide information

Takes advantage of technically ignorant users

100
Q

Types of Social Engineering attacks

A
Spoofing
Inpersonation
Phising
Vishing
Whaling
Spam or Spim
Hoax

Pg 389

101
Q

Insider Threat

A

Malicious employee

102
Q

Malware attacks

A

malicious code attacks

103
Q

Name some types of malware

A
Virus
Trojan Horses
Logic bombs
Worm
Spyware
Adware
Rootkit
Botnet
104
Q

Virus

A

code that spreads from one computer to another

Code must be activated by users

105
Q

code that spreads from one device to another without human intervention

A

worm

106
Q

Must fool the users into executing it and can pave way for other attacks

A

Trojan HOrse

107
Q

Sits dormant to a specified time of activation

A

Logic Bomb

108
Q

Reports system usage without users consent

A

Spyware

109
Q

Displyas or downloads unwanted advertisiments

A

Adware

110
Q

Code that takes full or partial control of a system. Hides itself from monitoring and detection. Modifies low level system files. Used to install back doors

A

Rootkits

111
Q

set of devices that are controlled remotely by a control program/. Used to mount DOS and DDOS attacks

A

Botnets

112
Q

Goal of a software attack

A

disable or disrupt software on a users machine

113
Q

Grayware

A

Spyware and adware are not often malicious in nature but they are unwanted.

114
Q

If gray ware is disclosed in the End User License Agreement is it malware

A

no

115
Q

Types of viruses

A
Boot Sector
Macro
Mailer 
Poly morphic
Script
Stealth

Pg 393

116
Q

Effects of malware

A

pg 393

117
Q

Compromised system

A

system infected by malware

118
Q

buffer overflow

A

targets vulnerability to cause the device OS to crash and reboot.

119
Q

Buffer overflows are caused when

A

input controls are weak and attacker injects too much in of into the software causing the system to run out of allocated memory or buffer.

120
Q

Buffer overflows allow an attacker to

A

open connections

Spawning shells

121
Q

Do buffer overflows appear in system logs

A

no

122
Q

Buffer overflows attack what

A

C programs and variants
OS
Applications

123
Q

Password attacks

A

stealing passwords

124
Q

do password attacks show in logs

A

Audit logs as failed login attempts or attempts at unusual times or locations

125
Q

SAM database

A

pg 395

126
Q

Types of password attacks

A
Guessing
Stealing
Dictionary attack
Brute force
Hybrid attack
127
Q

Guessing

A

Guessing what a password is

Not very successful

Use acct lockup to thwart this attack

128
Q

Stealing

A

Sniffing network comms for passwords; reading sticky notes

129
Q

Dictionary attacks

A

successful lagainist easy and unsophisticated passwords

130
Q

Brute force

A

Very successful but needs time