Security Operations and Administration Flashcards

1
Q

What does a business continuity plan do?

A

Provide strategic planning and direction to protect the business’s ability to function after a disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality?

A

Keeping sensitive, private, or proprietary data from being revealed to or accessed by an unauthorized subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the difference between confidentiality and privacy

A

Confidentiality is about keeping information secret

Privacy is about choosing who can enter into one’s life or property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is due care?

A

Taking steps to ensure that all of your responsibilities can be accomplished satisfactorily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is due diligence?

A

Checking to make sure that all of your due care tasks are actually getting the job done correctly and completely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are mantraps?

A

Physical security controls that can restrict entry to a protected area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are phishing attacks most often used to do?

A

Establish initial access to the target system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the difference between safety and reliability

A

Safety requires that when system fails, they do not harm other systems, people, or property. Reliability requires them to produce accurate, on time answers as and when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security for collaboration environments most depends on what?

A

Education and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kinds of risks can OT systems pose to IT systems, and vice versa?

A

Any interconnections provides a path across the security boundary between these systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different categories of security control functions?

A
  1. Directive
  2. Deterrent
  3. Preventative
  4. Detective
  5. Reactive
  6. Corrective
  7. Compensating
  8. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a corrective control and a compensating control?

A

Corrective controls restore or reset the system to its proper state

Compensating controls assist the actions controls, or acts as substitutes for those controls that cannot be directly implemented for various reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a zero-trust architecture as a security model?

A

A combination of microsegmentation of networks, stronger authorization tests for resource use, stronger identity management, and behavioral analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do operational technologies (OT) differ from information technologies?

A

OT use information from physical sensors to make physical actions happen, like opening a valve or moving a mechanism. It can directly damage property or injure/kill people

IT systems move, shape, store, create, and share information. Does not directly interact with the physical world. It would need an OT endpoint system (ex. UAV, robots)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly