security Flashcards

skill set

1
Q

WHAT ARE SOME STRATEGIES FOR SECURE SYSTEMS

A

RISK ASSESSMENT
WHAT IS MOST IMPORTANT
LOSS OF EVENTS
FREQUENCY
IMPACT
MITIGATION
IMPLEMENTATION
COST
MAKE DECISION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. COST VS BENEFITES

A

REASONABLE ASSURANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

INCLUES HARDWARE, SOFTWARE, DATA, NETWORK, FACILITIES PLAN A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.

A

DISASTER RECOVERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CRITICAL BUSINESS PROCESS AND WHO SUPPORTS A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

A

BUSINESS CONTINUTIY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT NEEDS DONE - DELICATES RESPONSIBILITIES An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

A

SECURITY POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sysadmin, audit, network, security

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT DOES CIA TRIAD STAND FOR

A

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT LEVEL OF CIA IS AUTHENTICAION METHOD SINGLE FACTOR

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT LEVEL OF CIA IS USER ROLES AND ACCOUNTS

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT LEVEL OF CIA IS DATA ENCRYPTION USED

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AT WHAT LEVEL OF CIA IS EDUCATION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AT WHAT LEVEL OF CIA IS AUTHENTICATION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AT WHAT LEVEL OF CIA IS ANTI VIRUS USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AT WHAT LEVEL OF CIAS IS DATA ENCRYPTION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COMPANY MONITORS, MANAGES, MAINTAINS COMPUTER SECURITY

A

MSSP
MANAGED SECURITY SERVICE PROVIDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT ARE STEPS TO RESPOND TO CYBER ATTACK

A

INCIDENT NOTIFICATION
PROTECTION OF EVIDENCE/ACTIVITY LOG
INCIDENT CONTAINMENT
ERADICATION
INCIDENT FOLLOW UP

17
Q

WHAT ARE THE TWO CERTIFICATION NEEDED FOR COMPUTER FORENSICS FOR LEGAL MATTERS

A

CCE - CERTIFIED COMPUTER EXAMINER
ENCE CERTIFIED EXAMINER MASTERED COMPUTER INVESTIGATION

18
Q

NAME SOME AUTHENTICATION METHODS FOR SECURE NETWORKS

A

FIREWALL
NEXT GENERATION FIREWALL
ROUTERS
ENCRYPTION
ENCRYPTION KEY
TLS - TANSPORT LAYER SECURITY
PROXY SERVER
VPN
INTRUSION DETECTION SYSTEM

19
Q

hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the Internet; also limits access to the company’s network based on the organization’s Internet-usage policy can be configured to serve as an effective deterrent to unauthorized web surfing by blocking access to specific objectionable websites.

20
Q

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

A

NGFW - NEXT GENERATION FIREWALL

21
Q

a gateway that passes data between one or more local area networks (LANs)

22
Q

communications protocol is used to secure sensitive data. a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet enables a client (such as a web browser) to initiate a temporary, private conversation with a server (such as an online shopping site or bank)

A

TLS - TRANSPORT LAYER SECURITY

23
Q

serves as an intermediary between a web browser and another server on the Internet that makes requests to websites, servers, and services on the Internet for you

A

PROXY SERVER

24
Q

is software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment

A

IDS - INTRUSION DETECTION SYSTEM

25
Q

enables remote users to securely access an organization’s collection of computing and storage devices and share data remotely.

A

VPN - VIRTUAL PRIVATE NETWORK

26
Q

An evaluation of whether an organization has a well-considered security policy in place and if it is being followed.

A

SECURITY AUDIT

27
Q

an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack. Creating such a strategy typically begins with performing a risk assessment to identify and prioritize the threats that the organization faces.

A

SECURITY STRATEGY

28
Q

Business processes that are more pivotal to continued operations and goal attainment than others.

A

MISSION CRITICAL PROCESS

29
Q

An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

A

SECURITY POLICIES

30
Q

BRING YOUR OWN DEVICE

A

BYOD
PROS - MORE EFFICEINT/FAMILIAR WITH DEVICE
CONS - EXPOSE TO MALAWARE/PASSWORD PROTECTION/PRIVACY

31
Q

NAME SOME AREAS OF POSSIBLE ENTRY POINTS TO ORGANIZATIONS DATA INFORMATION

A

CLOUD COMPUTING
NETWORK COMPUTERS
MOBILE DEVICES
VIRTUALIZATION
OPERATING SYSTEMS
APPLICATIONS
WEB SITES
SWITCHES
ROUTERS
GATEWAY

32
Q

Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.

A

U.S. COMPUTER EMERGENCY READINESS TEAM US-CERT

33
Q

FEDERAL GOV’T DOES NOT HAVE TO INFORM ORGANIZATION OF VULNERABILITY

A

VEP - VULNERABILITY EQUITIES PROCESS

34
Q

NAME SOME CAUSES OF POOR SOFTWARE DESIGN

A

DO NOT KNOW HOW TO DESIGN QUALITY
DO NOT TAKE TIME
DO NOT FOLLOW RIGOUROUS ENGINEERING PRINCIPLES
NOT LEARNING FROM PAST MISTAKES
NOT UNDERSTANDING ENVIRONMENT
PRESSURE TO GET TO MARKET

35
Q

METHOD OR TECHNIQUE HAS CONSISTENTLY SHOWN RESULTS SUPERIOR TO THOSE ACHIEVED BY OTHER MEANS

A

BEST PRACTICE

36
Q

ORGANIZATION CHOOSES TO ELIMINATE VULNERABILITY THAT GIVES RIST TO PARTICULAR RISK IN ORDER TO AVOID RISK ALTOGETHER

37
Q

An approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times (where N could be 2, 3, 4 or more); the N-versions of software are run in parallel; and, if a difference is found, a “voting algorithm” is executed to determine which result to use.

A

N-VERSION PROGRAMMING

38
Q

A description of how a product or process could fail to perform the desired functions described by the customer.

A

FAILURE MODE