RFI Flashcards

1
Q

Bit-copy-tool

A

Creates bit for bit copy and hashes the contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Preservation of internal and external consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Config management ensures…

A

Changes do not adversely affect the orgs security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What determines how often to change a crypto key?

A

Confidential importance of the info being protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud deployment model types…

A

Public, Private, Community,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic password

A

Changes at every logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best practices are…

A

Suggestions. Not reasons for constructing policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continuous monitoring involves

A

Policy, process, and technology used to detect risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nontechnical means to enforce security

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gov’t classification levels

A

Unclassified, sensitive but unclassified, confidential secret, top secret

“Classified” is not a level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Every policy should have an…

A

Enforcement statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Primary security categories (3)

A

Prevention, Detection, Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Are biometrics an authentication factor or Accountability

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kerberos can use…

A

Symmetric keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificate contains which key?

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

x509 certificate fields

A

Issuers ID, Subjects public key, Subjects x500 name

17
Q

RPO belongs to which plan

A

BCP (not DRP)

18
Q

Change control process ensures changes are correct or effective?

A

Correct

19
Q

Tokens generate…

A

passwords that authenticate

20
Q

Qualitative impact analysis identify…

A

Areas for immediate improvement

21
Q

Account control triple

A

Prevention, detection, reaction

22
Q

Functional IR Team

A

Members from different departments that can bring expertise to a specific type of IR

23
Q

What is a Security Kernel

A

HW, firmware, and SW elements of a TCB that implement a reference monitor concept.

24
Q

Criteria that must be met by the organization

A

Standards