Security Basics Chpt 1 Flashcards

1
Q

What are examples of Confidentiality Controls?

A

Encryption, Access Control, Stegonagraphy, Least privilege, Need to know, separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of Integrity Controls?

A

Hashing, Digital Signatures, Backups, Version Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of Availability Controls

A

Redundancy, Fault Tolerance, Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fault Tolerance

A

Systems that continue functioning after components fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patch management

A

Application of software updates with minimal service disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redundancy

A

Multiple or backup systems designed for immediate or quick recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital signatures

A

Hashing and encryption used to prove a file’s origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashing

A

Digital fingerprints used to detect file alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steganography

A

Secret messages concealed inside of ordinary ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Layer Security/Defense Depth

A

Policies, Procedures & Awareness -> Physical -> Perimeter ->Network -> Host -> App -> Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Basic Risk Concept Order

A

Risk -> Threat -> Vulnerability -> Loss/Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk

A

the likelihood that a threat will exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk mitigation

A

Reduces the chances that a threat will exploit a vulnerability by implementing controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you calculate risk?

A

threat * vulnerability * Loss(Impact)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Attack Surface?

A

Points where ama attacker can discover/exploit vulnerabilities in a network or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Examples of Attack Vectors

A

Direct Access, Email, Removable Media, Remote and wireless, Supply Chain, Web, and social media, cloud

17
Q

Lowers costs, high level of flexibility, used to test security controls, updates, and patches

A

Virtualization

18
Q

What are Virtualization Concepts?

A

Hypervisor, Host, Guest, Snapshots, Sandboxing, Host availability, patch compatibility

19
Q

Used to create an authenticated and encrypted area of an employees phone

A

containers

20
Q

What are the functions of CASB?

A

Scan for malware and rogue device ass, monitor and audit user and resource activity, enable single-sign-on authentication, and enforce access controls and authorizations from the enterprise network to the cloud provider, mitigate data exfiltration by preventing access to unauthorized cloud services from managed devices