Section 1: Understanding Security Fundamentals Flashcards

1
Q

What are the three components of the CIA triad?

A

Confidentiality (where the data is encrypted)
Integrity (where the data uses hashing)
Availability (where the data is available, for example, by restoring data from a backup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why might an inactive CCTV camera be placed on the outside wall of a building?

A

An inactive CCTV camera could be used as a deterrent since criminals would not know that it is inactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean?

A

Preventing other people from viewing the data; the best way to keep data confidential is to encrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you control access of personnel to a data center?

A

Install a mantrap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of an air gap?

A

Prevent data theft by removing physical connections between the device and network. The only way to remove data from an air-gapped machine is with removable media like a USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three main control categories.

A

Managerial, Operational, Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three physical controls.

A

Lighting
Cameras
Robot sentries
Fences
Gate signage
Industrial camouflage
Security guards
Badges
Key management
Proximity card
Tokens
Biometric locks
Electronic locks
Burglar alarms
Smoke detectors
Internal protection
Conduits
HVAC
Cable locks
Airgap
Laptop safe
USB data blocker
Vault
Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Following an incident, what type of control will be used when researching how the incident happened?

A

Detective controls, wherein all evidence is gathered and analyzed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you know whether the integrity of your data is intact?

A

Hashing provides data integrity; the hash value is measured before and after accessing data. If the values match, it has integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a corrective control?

A

The actions you take to recover from an incident. You may have to restore data from a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of control is it when you change the firewall rules?

A

Technical control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is used to log in to a system that works in conjunction with a PIN?

A

Smart card
CAC card
PIV card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the person who looks after classified data? Who gives people access to the classified data?

A

The custodian stores and manages the data. The administrator grants access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you use a DAC model for access, who determines who gains access to the data?

A

The data owner decides who has access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is least privilege?

A

The process of giving an employee minimal permissions to perform their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What access is granted by the Linux file permission of 764?

A

Owner: Read, Write, Execute
Group: Read, Write
Other: Read

17
Q

The sales team is allowed to log in to the company system between 9am and 10pm. What type of access control is being used?

A

Rule-based access control. The access is applied to the whole department.

18
Q

Two people from the finance team are only allowed to authorize the payment of checks. What type of access control are they using?

A

Role-based access control; where a subset of a department is carryout out a subset of duties.

19
Q

What is the purpose of the defense in-depth model?

A

To protect data and resources. If the outer layer fails, the next layer should perform the protection. Many layers need to be broken through before gaining access to the data or resource.

20
Q

When someone leaves the company, what is the first thing you should do with their user account?

A

Disable the account and reset the password so it cannot be used.

21
Q

What do US companies that host websites in the US have to comply with if customers are based in Poland?

A

The EU GDPR states that if a website that is hosted by someone in the US is accessed by someone from within the EU, that website needs to be GDPR compliant.

22
Q

How can a company discover that its suppliers are using inferior products?

A

If a company puts a right to audit clause into a contract, it gives them the right to audit the supplier at any time. The company can then look at the company records and check the quality of the products and materials being used.

23
Q

What is one of the most important factors between someone being arrested and their appearance before the judge in court?

A

Chain of custody: a record of who has collected the evidence and provides a log of who has handled the data. The original data must be intact, and there must not be any break in the chain.

24
Q

Can you explain what the purpose of the CLOUD Act and COPOA is?

A

CLOUD Act (US): right to obtain evidence from other countries for an FBI investigation.
COPOA (UK): right to seek data stored overseas and give their law enforcement faster access to evidence held by providers

25
Q

What is Stage C of Cloud Forensic Process 26?

A

Ascertain the type of technology behind the cloud.