Security for Networked AV Applications Flashcards

1
Q

Ideally, security requirements should be identified during the ____ phase.

A

needs analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ____ describes what an organization is trying to protect and how vigorously it needs to protect it.

A

security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The security posture should be set by the ____.

A. AV designer
B. architect
C. client
D. general contractor

A

C. client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stakeholder Input

These are the stakeholders who own data. They determine what needs to be protected and how vigorously. The other two areas support operational security.

A. Security
B. Network
C. Physical

A

A. Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stakeholder Input

These are the IT stakeholders who specify and administrate network policies. There are generally two types of stakeholders: those responsible for the ports and protocols, firewalls, and routers in a network; and those responsible for access control.

A. Security
B. Network
C. Physical

A

B. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stakeholder Input

These are traditional security stakeholders, responsible for physical access to gear, spaces, and more. They can help you create policies on how to secure gear and cabinets to prevent theft.

A. Security
B. Network
C. Physical

A

C. Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Triple-A of Access Control

The person using the system is who they say they are. This is proven with certificates, passwords, and tokens.

A. Authentication
B. Authorization
C. Accounting

A

A. Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Triple-A of Access Control

The person using the system is allowed to use it and take specific actions. This is managed through permissions in the system and directories.

A. Authentication
B. Authorization
C. Accounting

A

B. Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Triple-A of Access Control

Those who manage the network
also have an accurate record of what happens with the system and over the network in general.

A. Authentication
B. Authorization
C. Accounting

A

C. Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Producing records proving who was using a networked system and what they did while they had access is called ____.

A

nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP, Telnet, and FTP are ____ protocols, meaning anyone with access and a simple network analyzer can see exactly what’s going across the wire, including usernames and passwords.

A

clear-text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ____ is a methodology for prioritizing the threats that you can mitigate. It usually takes the form of a comprehensive table or spreadsheet and helps you assign value to risks depending on two factors: probability and impact.

A

risk register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The CIA triad stands for ____, ____, ____.

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typically, there are four ways to handle risk.

Limit or avert the risky activity.

A, Avoid
B. Accept
C. Transfer
D. Mitigate

A

A, Avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Typically, there are four ways to handle risk.

Because the probability or impact is low enough, the client is willing to take the risk.

A, Avoid
B. Accept
C. Transfer
D. Mitigate

A

B. Accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Typically, there are four ways to handle risk.

The client can purchase insurance or maintenance plans or adopt cloud-based technology services.

A, Avoid
B. Accept
C. Transfer
D. Mitigate

A

C. Transfer

17
Q

Typically, there are four ways to handle risk.

Make changes to design, configuration, or operational procedures to lower the probability or impact of a risk to the point where it’s acceptable.

A, Avoid
B. Accept
C. Transfer
D. Mitigate

A

D. Mitigate