Section 2 Flashcards

1
Q

Which concept of the CIA Triad is associated with reliability?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user changes a number in a dataset with a typo. Which side of the CIA triad is most affected?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of identification

A

“something you know”
“something you are”
“something you have”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the final step in allowing access to resources?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

discretionary access control

A

Owner determines who gets access and what level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

mandatory access control

A
  • owner doesn’t get to decide
  • Separate group w/ authority sets access (gov. organizations)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rule-based access control

A

access according to a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attribute-based access control

A

based on specific attributes of a person, resource, or environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which attribute of the Parkerian hexad allows for proper attribution of the owner of a dataset?

A

Authenticity
- process of ensuring and confirming that the identity of the user is genuine and legitimate. Proving who you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack category is an attack against confidentiality?

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Response steps

A
  1. preparation
  2. detection and analysis
  3. containment
  4. eradication
  5. recovery
  6. post incident activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mutual authentication

A

What is the name of the process where the client authenticates the server and the server authenticates the client?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are audits performed?

A

Audits are performed to ensure compliance with applicable laws, policies, and other administrative controls is being accomplished as well as detecting misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly