Security Operations Flashcards

1
Q

The concept that no single individual has complete authority or control of a critical system is known by which term?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 advantages does separation of duties provide?

A
  • Reduces opportunities for fraud or abuse
  • Reduces mistakes
  • Reduces dependence on individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The concept involving regularly transferring key personnel into different positions or departments within an organisation is otherwise known as what?

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 3 advantages of job rotation?

A
  • Reduces opportunities for fraud or abuse
  • Eliminate single points of failure
  • Promote professional growth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 4 advantages of mandatory vacations?

A
  • provides opportunity to uncover fraud or abuse
  • Reduce individual stress, thus reducing the potential for mistakes or coercion by others
  • Discover inefficient process with another individual performs role in their absence.
  • Reveal single points of failure and opportunities for job rotation and separation of duties/responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the concept of “Need-to-know”?

A
  • states that only people with a valid to need to know certain information in order to perform their job functions, should have access to that information.
  • user must have relevant security clearance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the principle of “Least Privilege”?

A

persons should have the capability to perform only the tasks that are required to perform their primary jobs and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between the concepts of “Need-to-know” and “Least Privilege”?

A

“Need to know” is concerned with access control whereas “Least privilege” is concerned with functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can the “accumulation or privileges” occur?

A

When an employee moves to another role within the same organisation, but previous access rights are not revoked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main benefit of server virtualisation?

A

Reduces single point of failure as a virtual server can be replicated or moved from one physical server to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What things should be considered for systems regarding single points of failure?

A
  • Redundant Power Supplies
  • Multiple Power Supplies
  • Cooling Fans
  • RAID (Hot swappable)
  • Can the system be clustered or virtualised?
  • Can data be replicated to another system in real time?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What things should be considered for networks regarding single points of failure?

A
  • Do routers/ firewalls failover automatically and do they fail-back?
  • Do routers have multiple paths available to network destinations?
  • Do you have multiple service providers and do they share the same point of presence (POP)?
  • What happens if the connection to your telecommunications provider’s central office is cut?
  • Do your multiple telecoms providers networks go through the same telecoms hotel?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a telecoms hotel?

A

The facility that houses equipment belonging to many different telecoms providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What things should be considered for processes regarding single points of failure?

A
  • Do your personnel security policies and practices create single points of failure? ie you might have separation of duties, but not rotation of duties.
  • Do you have contingency processes in place in case a primary system, process or person is unavailable?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 key elements of handling sensitive information:

A
  • Marking
  • Handling
  • Storage and Backup
  • Destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a system failure occurs, in which type of environment may access be lost?

A

Fail-soft or fail-closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When a system failure occurs, in which type of environment will access be open to all?

A

Fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When a system crash occurs, what term is used to describe the system when access has been restored?

A

Fail-back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What term is used to describe strategic and tactical errors that an organisation can face whether by performing an action or failure to perform an action?

A

Errors & Omissions (E&O)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Errors & Omissions liability otherwise known as in legal terms?

A

Professional Liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What term is used to describe software that typically damages or disables, takes control of, or steals information from a computer system?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name 9 common types of malware:

A
  • Adware
  • Backdoors
  • Bootkits
  • Logic Bombs
  • Rootkits
  • Spyware
  • Trojan Horses
  • Viruses
  • Worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which type of malware uses pop-up advertising programs?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which type of malware uses malicious code that allows an attacker to bypass normal authentication to allow an attacker to gain access to a compromised system?

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which type of malware is a kernel mode variant of a rootkit, commonly used to attack computers that are attacked by full disk encryption?

A

Bootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which type of malware used malicious code that is activated when a specific condition is met, such as a particular date or event?

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which type of malware used malicious code to provide privileged (root level) access to a machine?

A

Root-kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which type of malware uses malicious software that collects information without a users knowledge and/or interferes with the operation of a computer by redirecting them to a web browser or installing additional malware?

A

Spy-ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which type of malware uses malicious software that masquerades as a legitimate program?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which type of malware uses malicious code that requires a user to perform a specific action to become active such as clicking an executable, attachment or link to become active?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which type of malware uses malicious code that is spread rapidly across a network without any user interaction required to activate it. This type of malware typically exploits known vulnerabilities and flaws that have not been patched.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What term would be used to describe an individual machine that has been infected with malware and is under the control of the attacker?

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Bot-herder?

A

An attacker that uses malware to take control of the infected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a botnet?

A
  • A network of infected machines (bots)
  • They typically have many command and control servers distributed all over the internet which gives the botnet a resilient distributed infrastructure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is an Advanced Persistant Threat (APT)?

A

targeted intrusions used by groups that use sophisticated botnets to attack a specific target such as an enterprise or government network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the 5 main system security controls?

A
  • Preventative
  • Detective
  • Corrective
  • Automatic
  • Manual
37
Q

What are the 6 main operational controls?

A
  • Resource Protection
  • Privileged Entity Controls
  • Change Controls
  • Media Controls
  • Administrative Controls
  • Trusted recovery
38
Q

What operational control is used to protect information assets and information infrastructure?

A

Resource Protection

39
Q

Resource Protection can be categorised into 6 areas. What are they?

A
Comms hardware and software
Computers and their storage systems
Business Data
System Data
Backup Media
Software
40
Q

Which Operational Control describes the mechanisms, generally built into the computer OS, which give privileged access to hardware, software and data?

A

Privileged entity controls

41
Q

What are the two prevalent forms of change control?

A

Change Management and Configuration Management

42
Q

Approval based process that ensures only approved changes are implemented is known as what?

A

Change Management

43
Q

the controls hat records soft-configuration and software changes with approval via the change management process is known as what?

A

Configuration Management

44
Q

information classifications and physical media control are controlled by which operational control?

A

Media Control

45
Q

Least privilege, Separation of duties and rotation of duties are categorised under which operational control?

A

Administrative Controls

46
Q

Documented processes and procedures for system recovery fall under which operational control?

A

Trusted recovery

47
Q

What are four common reasons for having system audit trails in place?

A
  • Accountability
  • Investigation
  • Event reconstruction
  • Problem identification
48
Q

List 9 common types of penetration testing:

A
Port scanning
Vulnerability scanning
Packet sniffing
War dialling
War driving
Radiation Monitoring
Dumpster diving
Eaves dropping
Social engineering
49
Q

What is port scanning?

A

The scanning of a target machine across a network for open un-used ports, that should either be de-activated or patched.

50
Q

Name 3 examples of port scanning tool?

A

Nmap
Nessus
SATAN

51
Q

What is vulnerability scanning?

A

A means of identifying exploitable vulnerabilities in a system

52
Q

What is packet sniffing?

A

A tool that captures all TCP/IP packets transmitted on a network or device

53
Q

How does packet sniffing differ on a switched media LAN?

A

Sniffers on switched-media LANs generally only pick up packets intended for the device running the sniffer

54
Q

What mode is used were a network adapter accepts all packets, not just packets destined for the system, and sends them to the operating system?

A

Promiscuous Mode

55
Q

What is war dialling?

A

War dialling is used to sequentially dial all phone number in a range to discover any active modems

56
Q

What is war driving?

A

War driving is the 21st century version of war dialling. Someone uses a laptop with a wireless LAN card and drives around densely populated areas looked for unprotected or poorly protected wireless LAN’s

57
Q

What is radiation monitoring?

A

The practice of determining what data is being displayed on monitors, transmitted on LAN’s or processed on computers using radio frequency/electromagnetic emanations.

58
Q

What is dumpster diving?

A

Exactly what it says

59
Q

What is eavesdropping?

A

Exactly what it says

60
Q

What is shoulder surfing?

A

Watching them work with discreet over the should glances

61
Q

What is social engineering?

A

active way of physically getting information form workers. low tech can involve a hacker masquerading as someone else

62
Q

What are the two common types of intrusion detection systems?

A

Network based IDS

Host based IDS

63
Q

What two methods are used by IDS?

A
  • Signature based

- Anomaly based

64
Q

What is signature based IDS?

A
  • compares network traffic that is observed with a list of patterns in a signature file. Downside is that it only detects known attacks and has to be periodically updated
65
Q

What is anomaly based IDS?

A
  • monitors all traffic on a network and build traffic profiles. over time the IDS will report deviations from the reports that it has built. Downside is that you may have higher false positives
66
Q

What is the difference between behaviour/heuristic based IDS and anomaly based IDS?

A

Rather than detecting anomalies to normal traffic patterns, behaviour-based and heuristics-based systems attempt to recognise and learn potential attack patterns.

67
Q

What is the difference between IPS and IDS?

A

IPS detects and blocks intrusions, whereas IDS simply detects them

68
Q

What term is used to describe the science of examining activity and audit logs to discover inappropriate activity?

A

Violation Analysis

69
Q

What does violation analysis use as thresholds for differentiating violations from non-events?

A

Clipping levels

70
Q

Describe an example of where clipping levels are used?

A

the number of login attempts failed on a system per hour. if the limit (clipping level) is exceeded within that hour, then a violation has occurred.

71
Q

What is keystroke monitoring?

A

the recording of all input activities on a terminal or workstation.

72
Q

What is traffic and trend analysis?

A

monitoring of the activities of an individual or organisation, based on the type and volume of traffic on a network.

73
Q

Name 4 types of physical monitoring?

A
  • watching logs of buildings with card-key access control
  • monitoring unmanned entrances, ie CCTV
  • Staffing key locations with security guards
  • installing and monitoring security alarm sensors
74
Q

What is the process of detecting, responding and fixing a problem known as?

A

incident management or problem management

75
Q

What is a system operator?

A

normally found in data center environments. managing infrastructure.

76
Q

What is the extent of the security admins role in relation to background checks?

A

checking that they have been completed prior to assigning accounts.

77
Q

What is Account Validation?

A

Period reviewed of inactive accounts

78
Q

In the US, US Civilian Government Agencies are required to report breaches of personal identifiable information to whom with a n hour of occurring?

A

US-CERT (US Computer Emergency readiness Team)

79
Q

What is Root Cause Analysis? (RCA)

A

asking why until there is only one answer

80
Q

What is the difference between incident management and problem management?

A

Incident is concerned with managing an adverse event, whereas problem management is concerned with tracking the event back to its root cause. Incident limits the affect whereas problem addresses defects

81
Q

What can be obtained from the following?

A

cve. mitre.org (Common Vulnerability Exposure Database)
nvd. nist.gov (Online database of known vulnerabilities managed by NIST
www. cert.gov (online resource for a wide variety of information on known vulnerabilities

82
Q

What is the last step of the patch management process?

A

Documentation

83
Q

What are two characteristics of a SAN?

A
  • dedicated block level storage on a dedicated network.

- utilise protocols like iSCSI to appear to operating systems as locally attach devices

84
Q

What is a NAS?

A

designed to simply store and serve files, ie FTP server, file server

85
Q

What term is used to describe multiple disks used for a single partition?

A

Concatenation (a concatenated disk will appear tot the OS as a single drive

86
Q

RAID levels:

A
  • RAID 0:no redundancy
  • RAID 1:mirroring. ocstly due to needing double the disk space.
  • RAID 2:theoretical and not used in practice.
  • RAID 3:requires 3 or more drives. data is striped at byte level. has a dedicated parity drive to reconstruct data
  • RAID 4: requires 3 or more drives. data is striped at block level. has a dedicated parity drive to reconstruct data
  • RAID 5: requires 3 or more drives. parity information accross all drives.
  • RAID 6: extends capabilities of RAID 5. dual parity. accommodates failure of two drives however performance is poor and not widely used.
  • RAID 0+1: uses two different sets of disks. one for striping and for mirroring data to different set of disks.
  • RAIS1+0: Each drive is mirrored to amatching set. wen data is striped to one it is immediately striped to the other. (better for speed and redundancy)
87
Q

Which type of RAID is most commonly used?

A

RAID 5

88
Q

What is RAIT?

A

Redundant Array of Independent Tapes. used for tape media