Set 1 Flashcards

1
Q

Backs up all files that have changed since the last full backup

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the OSI Layer does connection between applications on each computer?

A

Layer 5 (Session)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Default Subnet Mask for Class A Range

A

/8
255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the process of settings all data bits to zero, effectively erasing the data

A

Zeroization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do worms spread from system to system?

A

Software Vulnerabilities/Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 3-way handshake?

A

SYN, SYN-ACK, ACK
Between client & server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adverse

A

Preventing success or development; harmful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Set of guidelines or rules that dictate how access control should be implemented

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most common form of risk when buying insurance

A

Transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What OSI Layer do TCP & UDP Operate at?

A

Layer 4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides automated log monitoring & analysis

A

Security Information and Event Management (SIEM) System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows owner of resource to configure access rules. Full control to configure what subjects can access the object

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An entity/resource that’s accessed by subject

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regulate access based on security labels assigned by central authority. More commonly used in the military and government

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is another name for host-based IDS/IPS products?

A

Endpoint Security Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Default Subnet Mask for Class C Range

A

/24
255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Users, resources & environment conditions to make access decisions

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Backs up all files that have changed since the last backup of any type

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management-oriented controls that provide directives and instruction aimed at people within the organization

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A list of all subjects and their respective permissions for a specific object

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What OSI Layer deal with transmitting & receiving bits?

A

Layer 1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What OSI Layer transmits & delivers frame throughout a LAN based on physical MAC addresses?

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Assigns access based on roles within an organization

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Defines the conditions under which access is allowed/denied

A

Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attack that uses a spoofed IP Address in the ICMP message so traffic is sent to the wrong location

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Default Subnet Mask for Class B Range

A

/16
255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Stores all of the files on the system each time the backup process is run

A

Full Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Emails sent to specific individuals/employees of organizations

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An entity that’s capable of accessing an object

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What OSI Layer is responsible for routing and route selecting network packets on logical IP addresses?

A

Layer 3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What logical address is assigned to devices connected to a network/Internet?

A

Internet Protocol (IP) Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Used to map IP addresses to MAC addresses on a LAN

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Network device used to enforce certain security rules that govern how traffic may flow

A

Network Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cloud provider gives customers self-service access to a pool of infrastructure resource (network, server, storage, etc.)

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Software service/application hosted by cloud provider and provided to customers

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cloud service provider gives customers access to platforms where they can develop, test & run code for applications developed in various programming languages

A

Platform as a Service (PaaS)

37
Q

Automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database

A

Logical Access Control

38
Q

Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization

A

Defense in Depth

39
Q

Management, operational and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity and availability of the system and its information

A

Security Controls

40
Q

Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions

A

Security Operations Center

41
Q

Collecting and storing user activities in a log, which is a record of the events occurring within an organization’s systems and networks

A

Logging

42
Q

To protect private information by putting it into a form that can only be read by people who have permission to do so

A

Encrypt

43
Q

The process and act of converting the message from its plaintext to ciphertext

A

Encryption

44
Q

The total set of algorithms, processes, hardware, software and procedures that taken together provide an encryption and decryption capability

A

Encryption System

45
Q

The reverse process from encryption. It is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and the appropriate key for decryption

A

Decryption

46
Q

The right of an individual to control the distribution of information about themselves.

A

Privacy

47
Q

System capabilities designed to detect and prevent the unauthorized use and transmission of information

A

Data Loss Prevention (DLP)

48
Q

A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated

A

Configuration Management

49
Q

Property that data has not been altered in an unauthorized manner

A

Data Integrity

50
Q

Event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits

A

Incident

51
Q

The process of detecting and analyzing incidents to limit the incident’s effect

A

Incident Response (IR)

52
Q

Documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization’s information systems(s)

A

Incident Response Plan (IRP)

53
Q

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency

A

Business Continuity (BC)

54
Q

The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption

A

Business Continuity Plan (BCP)

55
Q

In information systems terms, the activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale

A

Disaster Recovery (DR)

56
Q

The processes, policies and procedures related to preparing for recovery or continuation of an organization’s critical business functions, technology infrastructure, systems and applications after the organization experiences a disaster

A

Disaster Recovery Plan (DRP)

57
Q

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service

A

Threat

58
Q

An individual or a group that attempts to exploit vulnerabilities to cause or force a threat to occur

A

Threat Actor

59
Q

A threat actor carries out their objectives

A

Threat Vector

60
Q

Entirety of the policies, roles and processes the organization uses to make security decisions in an organization

A

Security Governance

61
Q

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

A

Cloud Computing

62
Q

The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations

A

Risk Assessment

63
Q

Lays out a process and timeline for actions in event a key executive/employee is lost to the organization

A

Succession Planning

64
Q

Deployment of UPS/generators, communication link redundancy, fire detection & suppression systems

A

Preventive Controls

65
Q

What OSI Model does a WAF operate at?

A

(Layer 7) Application

66
Q

Checks for available IP addresses from a pool and automatically assigns them to client devices

A

Dynamic Host Configuration Protocol (DCHP)

67
Q

Simplest and least expensive type of firewall and uses ACL to control traffic

A

Packet Filter

68
Q

Specialized software that limits the websites users can access

A

Web Filter

69
Q

Firewall on individual computer that allows or denies connections to that computer based on a set of rules

A

Host-Based Firewall

70
Q

Priorities to evaluate the impact of threats to the business

A

Qualitative Risk Analysis

71
Q

Hardware or software components that protect computing and network resources

A

Technical Controls

72
Q

Control functionality which describes the protection a control provides. Communicate expected behavior

A

Directive Controls

73
Q

An example of an administrative control

A

Security Awareness Training

74
Q

Biometric authentication uses what type of security control?

A

Technical Controls

75
Q

Separation of duties require job functions to be assigned so that one employee can’t commit fraud by himself since the critical job function is split between 2 or more employees

A

Segregation of Duties

76
Q

One department is responsible for governing, managing and configuring tools for access administration for all systems

A

Centralized

77
Q

Access control is managed by different departments/people for different systems throughout the organization

A

Decentralized

78
Q

Key component of detection and analysis phase of incident response plan

A

Reviewing Logs & Security Alerts

79
Q

Preparation | Detection and Analysis | Containment, Eradication, and Recovery | Post-Incident Activity

A

Incident Response Process

80
Q

What phase of the incident response process involves bringing systems and data back to normal operation?

A

Containment, Eradication, and Recovery

81
Q

Example of biometric (Type 3) authentication factor

A

Facial Recognition

82
Q

What phase of data lifecycle is data retained in order to comply with regulatory, legal, or other obligations?

A

Archive

83
Q

Output of information that is run through a hash function

A

Message Digest

84
Q

Backbone of security program. Lay out the requirements that everyone in the organization must follow

A

Security Policies

85
Q

Value that is used as input into a cryptographic algorithm that allows for encryption and decryption operations to take place to transform plaintext to ciphertext

A

Cryptographic Key

86
Q

Accuracy, consistency, and trustworthiness of data and systems

A

Integrity

87
Q

Altering data without proper authorization is a breach of _?

A

Integrity

88
Q

Method used as a protection against compromises of integrity?

A

Hashing