MOD 8 - Midterm Flashcards

(80 cards)

1
Q

What do the letters in the CIA triad stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality?

A

Concept of measures used to ensure the protection of the secrecy of data, objects or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is integrity?

A

The concept of protecting the reliability and correctness of data. prevents unauthorized altercations of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Availability?

A

Authorized subjects are granted timely and uninterrupted access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the AAA services.

A

Identification
Authentication
Authorization
Auditing
Accounting(Accountability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the types of security plans in security governance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the minimum level of security?

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Due dilligence

A

Establishing a plan, policy and process to protect the interest of an organization, knowing what should be done and planning for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due care

A

practicing the individual activities that maintain the due diligence effort, doing the right action at the right time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Separation of duties

A

Making sure duties are split from each other so things get done ; protects from fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Job rotation

A

Making sure multiple people know how to do the same job and you are forcefully rotated into this position; protects against fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SLA?

A

Service Level Agreement
An agreement established ahead of time that ensures organizations providing services to internal and/or external customers maintain an appropriate level of service agreed on by both the service provider and the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is security governance

A

The collection of practices related to supporting, defining and directing the security efforts of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is risk assessment?

A

A detailed process of identifying factors that could damage or disclose data, evaluating those factors in light of data value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is vulnerability?

A

Weakness in asset or the absence or the weakness of a safeguard or countermeasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of risk analysis?

A

Qualitative - Rank threats on a scale to evaluate their risks, costs and effects
Quantitative - Inventory assets and assign a value (money)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the risk responses?

A

Reduce/Mitigate
Assign/Transfer
Accept
Deter
Avoid
Reject/Ignore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is exposure?

A

The amount of damage done to an asset if the risk manifests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is asset value?

A

How much something costs. Dollar amount of the asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is BCP?

A

Business Continuity Planning

Involves assessing risks to organizational processes and creating policies, plans and procedures to minimize the impact those risks might have on the organization if they were to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is shoulder surfing?

A

Looking over someone shoulder to get their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 4 steps of BCP?

A

Project planning and scope
Business impact analysis
Continuity planning
Approval and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the two types of threats?

A

Natural
Person made/Man made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is BCP used?

A

To reduce the impact of a realized risk on organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the main formula for SLE?
SLE (Single loss expectancy) = Asset value * Exposure Factor
26
What is the formula for ALE?
ALE = SLE * ARO
27
What is ARO?
Annualized rate of occurrence (number of times per year)
28
In the scope of BIA, what is MTD?
Maximum tolerable downtime The amount of time a business can be inoperable.
29
What is RTO?
Recovery time objective The amount of time it takes for a business to recover.
30
What is PHI?
Protected Health Information Health information that relates to an individual.
31
What is proprietary data?
It gives competitive advantage
32
What are the government data classification?
Top secret Secret Confidential Unclassified For official use only Sensitive but unclassified
33
What are the non-government data classification?
Confidential/Proprietary Private Sensitive Public
34
What is Data at Rest?
Any data stored on media such as system hard drives, solid state devices, external, USB drives, storage area networks and backup tapes.
35
What is Data in transit
Includes data transmitted over an internal network using wired or wireless methods and data transmitted over public networks such as the internet.
36
What is Data in use?
Refers to data in memory or temporary storage buffers while an application is using it.
37
What is DLP? How does it work?
Data Loss Prevention Hostbased/Endpoint Based DLP (looks on your host to make sure information isn't put on USB stick. Network based DLP (looks on the network to find keywords)
38
What do baselines provide?
The minimum level of security
39
What is PII?
Personal Identifiable Information Anything that can identify a human
40
What would occur if top secret data is breached?
Exceptionally grave damage
41
What is anonymization?
The process of removing all relevant data so that it is theoretically impossible to identify the original subject or person.
42
What is hardware?
Physical components of a computer. Anything you can touch.
43
What is multi-processing?
Having more than one processor simultaneously
44
What are the 2 modes in an operating system
User and Privileged/Kernel
45
What is ROM?
Read Only Memory You can't write on it
46
What is Random Access Memory?
Directly readable and writable memory
47
What is Firmware?
Software that is stored in a ROM or an EEPROM chip. E.g BIOS
48
What is a DCE?
Distributed Computing environment
49
What is IOT?
Internet of things
50
Mobile device deployment policy
Bring your own device (BYOD) COE (Corporate-Owned personally enabled) CYOD (Choose your own device) COMS (Corporately owned mobile strategy; the best one)
51
What is a rootkit?
Malware that embeds itself deep within an OS
52
What is a covert channel?
Information that is shared on a path that is not normally used to pass information.
53
What is Malware?
A broad range of software threats that exploit various network, operating system, software, and physical security vulnerabilities to spread malicious payload to computer systems. or Broad range of software with malicious payloads EX: Trojan Horses, viruses, worms
54
What is APT?
Advanced persistent Threat
55
What are the two main functions of viruses?
Propagation Destruction
56
What is a logic bomb?
Malicious code that lies dormant until triggered by the occurrence of one or more conditions such as time, program launch, website logon, certain keystrokes.
57
Who introduced logic bombs?
Coders because they want to protect their code.
58
What worm infected something in Iran?
Stuxnet
59
What is spyware?
Monitors your actions and transmits important details to a remote system that spies on your activity.
60
What are zero days?
Security flaws discovered by hackers that have not been thoroughly addressed by the security community.
61
What is integrity monitoring?
Programs that detect unauthorized file modifications
62
What is code signing?
Use digital signatures to ensure the authenticity of code.
63
What are injection attacks?
Specially formatting input to execute user-defined SQL commands.
64
What is secure coding practices?
Input Validation Error handling Remove comments Get rid of hardcoded credentials
65
What does physical security protect against?
Physical threats
66
What is secure facility plan?
Outlines the security needs of your organization and emphasizes methods or mechanisms to employ to provide security.
67
What is critical path analysis?
A systematic effort to identify relationships between mission-critical applications, processes and operations and all of the necessary supporting elements.
68
What are the functional order of controls?
Deterrence Denial Detection Delay Determine Decide
69
What is MTTF?
Mean Time To failure Expected typical functional lifetime required to perform a repair on a device given a specific operating environment
70
What is MTTR?
Mean Time To Repair Average length of time required to perform a repair on the device
71
What physical considerations are required for server rooms?
Human Incompatible: Gas fire extinguisher Low temperatures Little or no lightning Equipment stacked with little room to maneuver
72
What is local alarm system?
Broadcast audible alarm
73
What is piggybacking?
Following someone through a secured gate or doorway without being identified or authorized personally
74
What is a SCIF?
Sensitive Compartmented Information Facility Used by the government and military contractors to provide a secure environment for highly sensitive data storage and computation.
75
What is UPS?
Uninterruptable Power Supply A self charging battery that can be used to supply consistent clean power to sensitive equipment.
76
What is a brownout?
Prolonged low voltage
77
What are the two modes of EMI?
78
What class of fire extinguishers should be used for electric systems?
Class C
79
What is Access control vestibule?
A mantrap
80
What is KPI? What does it do?
Key Performance Indicators Provide metrics of operations.