Messer exam 1 Flashcards
fencing
the process of** isolating a node of a computer cluster or protecting shared resources** when a node appears to be malfunctioning.
Authentication token
piece of information that verifies the identity of a user to a website, server, or anyone requesting verification of the user’s identity.
Biometrics
the process of using electronic devices to identify people by recording and analyzing their unique physical or behavioral characteristics. used to access door
Lighting
for outside building
Security guard
protect lobby
Access badge
used for door entrance
Access control vestibule
also known as a mantrap, is a physical access control system that creates a space between two sets of interlocking doors. used in lobby
operational
are often implemented by people instead of systems.
Security guards and awareness programs are examples of an operational control
managerial
are **administrative controls associated with security design **
and implementation. ```
A set of policies and procedures would be an example of a
managerial control
Physical
are used to** limit physical access**.
Badge readers, fences, and guard shacksare categorized as physical controls
Technical
are implemented using systems. Operating system controls,
firewalls, and automated processes are considered technical controls.
Something you have
During the login process, ```
your phone receives a
text message with a one-time passcode
~~~
something you know
PIN
something you are
bio metrics–fingerprint
somewhere you are
Your login will not work unless you are
connected to the VPN
Passive reconnaissance
**gathering as much information from
open sources such as social media, corporate websites, and business **
organizations
Vulnerability scanning
Some active reconnaissance tests will query systems directly to see if a
vulnerability currently exists
Supply chain analysis
will examine the security associated with a
supplier, and the analysis will not provide any information regarding a
company’s own servers and data
Regulatory audit
A regulatory audit is a detailed security analysis based on existing laws or
private guidelines. A regulatory audit commonly requires access to internal
systems and data
**DMARC ****(Domain-based Message Authentication Reporting and Conformance)**
specifies the disposition of spam emails. The legitimate
owner of the originating email domain can choose to have these messages
accepted, sent to a spam folder, or rejected
SPF (Sender Policy Framework)
is
a list of all authorized mail servers for a specific domain. All legitimate emails would be sent from one of the
servers listed in the SPF configuration
NAC (Network Access Control)
is a way to limit network access to only
authorized users. NAC is not commonly used to manage the transfer of
email messages.
DKIM (Domain Keys Identified Mail)
provides a way to validate all
digitally signed messages from a specific email server. DKIM does not
determine how the receiving server categorizes these digitally signed
messages
Root cause analysis
The goal of a root cause analysis is to explain the ultimate cause of an
incident. Once the cause is known, it becomes easier to protect against
similar attacks in the future
E-discovery
relates to the collection, preparation, review, interpretation,
and production of electronic documents.
E-discovery itself is not involved
with the research and determination of an attack’s root cause
Risk appetite
describes the amount of risk an organization is willing to
take before taking any action to reduce that risk.
Risk appetite is not part
of a root cause analysis
Data subject
describes any information relating to an identified or
identifiable natural person,
especially when describing or managing private
information about the subject
Automation
Automation ensures that compliance checks can be performed on a
regular basis without the need for human
intervention
Maintenance window
describes the scheduling associated with the
change control process
. Systems and services generally have limited
availability during a maintenance window
Attestation and acknowledgment
With compliance, the process of attestation and acknowledgment
is the
final verification of the formal compliance documentation
External audit
can be a valuable tool
for verifying the compliance process,but an automated alert from a monitoring system would not be
part of an external audit
Obfuscated
describes the modification of data to make something
understandable into something very difficult to understand.