Study This Flashcards
If risks were categorized as either critical or normal, what risk assessment method is being used?
Qualitative
What risk assessment method produces number results
Quantitative
What document is intended to help deal with potential issues and conflict among partners
BPA
Business partner agreement addresses things like ownership, profits, losses and partner contributions
What does a more threat centered security program look like?
Focusing on understanding adversaries motivations and capabilities
What is characterized as an attempt to gain access to a systems resource
Exploit
What document defines the technical security requirements associated with two orgs and who are connecting their information systems /network?
Interconnection security agreement, ISA
When do we normally build a risk matrix
Qualitative risk analysis
A developer composes a document that details all the entry points through which an attacker could attempt to introduce code into the app environment, what does this document represent
Attack surface
Single loss expectancy equals (=) assets values times (x) exposure factor
The percentage of an asset that is lost due to a threat event
What is the minimum and customary practice of responsible protection of information assets is defined by which of the following terms?
Due care
Of two people are working together and we are concerned about collusion, what is performed?
Rotation of duties
What is a central characteristic of accountability
A systems ability to determine the actions and behavior a single individual within a system
What is the opposite of the CIA triad
Disclosure, alteration and destruction
Report assessing design, suitability and effectiveness for a service organization security controls over a period of time
SOC 2 type 2
What term is primarily concerned with enumerating an understanding the various ways an adversary might negatively impact the security of an application slated for development
Threat modeling
Policies standers guidelines in security awareness training fall under which of the following control categories
Directive controls
What principal Requires multiple individuals authorization in order to carry out a particularly critical function
Separation of duties
Security incident can be thought of in which of the following terms?
Confidentiality, integrity and availability
Which of the following terms describes the right to protect the expression of ideas
Copyright
When calculating the cost of risk I need to look for two factors which of the following choices one of these factors
Single loss expectancy
Your organization just discovered an incident in which PII looks to have been accessed But not ex filtrated. What should you do
Disclosure within 72 hours of the incident discovery
What document would be used to ensure that the IT department meeting is contractual obligations with the audit team
Ola
Operating level agreement which is an internal agreement that supports the SLA
And quantitative risk management single loss expectancy is used to quantify what
The amount of financial impact that would result if a breach occurred that impacted an asset
Prior to excepting a risk what has most likely occurred
Risk mitigation
There will always be a residual risk even if mitigating counter measures are leveraged. Either this occurs explicitly and formally or risk is accepted implicitly by choosing not to employ additional avoidance, transfer, or mitigation measures
Which ISO information security standard focuses on auditing
27001
Which type of technology would be best suited to help monitor and possibly even bolster the security of a SaaS Solutions being used by on premise employees
CASB
Cloud access security brokers are on premise or cloud base security policy enforcement points, place between cloud service consumers and cloud service providers to combine an interject enterprise security policies as cloud base resources are accessed
Identifying and labeling all personally identifiable information would be example of what
Data classification
What process customizes a standard for an organization, beginning with scoping, then adding compensating controls with parameters ( security configuration settings) 
Tailoring
What process determines the applicable portions of a standard that must be followed by organization
Scoping
Which of the following is considered nonvolatile memory
ROM
Read only memory is nonfilel storage where locations can be directly access in basic implementation. Data cannot be altered dynamically. Nonfiled storage retains this information even when the computer loses power, and can be used to boot the system.
Both dynamic ram static ram are volatile memory
Senior manager has grown particularly concerned about the potential for breach of PII data. Which of the following controls is most directly applicable to their concern
DLP
Data loss prevention tools and software filter data streams on networks, control and monitor and point activities, and monitor data in the cloud. DLP tools protect data and use data in motion and data at rest. Data loss prevention programs also feature reporting, which aids both and identifying anomalies and problems for forensic response and in meeting audit in routine compliance requirements
What is true about dynamic ram
DRAM Data is rewritten multiple times each second
Hint, dynamic RAM 
It is always being rewritten hence dynamic
What are small extremely fast storage locations directly accessible to the CPU?
Registers
Which organization managers request for comments RFCs
IETF
Request for comments RFC‘s are managed by the Internet engineering task force (IETF) 
Which role sets that information security priorities and supports the mission of the organization
Business owner
Which of the following choices is also referred to as flash memory
Electronically erasable programmable read only memory(EEPROM)
Which method of media sanitation is performed the other local device interface, but could still potentially loud data recovery through other advanced recovery methods
Clear
Clearing is done locally via the device interface (the operating system) .
Data are not recoverable the other device in her face but I may be recoverable the advanced recovery methods
Which ISO information security standard focuses on best practices
27002
Electronic versions courseware from your favorite security training organization plays technology that limit your ability to add your own notes to the files. The files also incorporate a unique identifier that can assist in determining the source of copyrighted information having been pirated. What type of technology are they using
DRM
Digital rights management is a sweet of technology designed to protect copyrighted digital media
All types of programmable read only memory are actually special cases of a more general sort of technology
Programmable logic device (PLD)
What I associate was formally known as ISO 17799
ISO 27002
What is the best way to remove data from right once read many (worm) media
Destruction
When comparing DRAM AND SRAM. Which of the following statements is true
Dram is slower than sram
What term describes writing data to an EEPPROM
flashing
What is the best method to secure lead astray data on a DVD – r
Destruction
What role crazy manager sensitive data
Data controller
What role is in charge of computer hardware and software design, plans, and updates
System owners
What is a set of memory addresses managed by the OS that do not correspond directly to physical memory
Virtual memory
What refers to the computer’s capability to execute instructions in parallel due to the usage multiple CPUs
Multi processing
Low level commands that a CPU knows how to execute and performs many operations per instructions
CISC
The RSA algorithm uses what kind of intractable problem as the basis of its crypto system
Factoring certain large integers into their two prime factors
Which of the following coordinates systems activities during execution of code
CPU control unit
What model deals with potential conflict of interested
Brewer nash
What is a real time alternative to using CRL
OCSP
Online certificate status protocol
What term indicates the degrees of randomness
Entropy
Security model includes the no read up (simple security property) and no write down
Bell LaPadula
What security integrity model focuses on internal consistency, external consistency, will form transactions, separation of duties
Clark Wilson
Which of the following ensures that previously captured communications are not decrypted if a session key is comprised
Perfect forward secrecy
which of the following performs the calculations or operations based on programs calls
CPU arithmetic logic unit
Terms the deceives the CPUs ability to process more than one program at a time
Multitasking
What’s a cutie model includes no re-down and no right up
Simples integrity
Biba
What is a common operating system protection that prevents one software application from affecting another software application if it crashes
Process isolation
What is the term for copying memory data to a bd from hard disk
Page fault
What is the terms when the OS Copies virtual memory from hard disk to main memory
Paging
What protocol do routers use to determine the path that should be taken by a packet
IP
When you see 1E4DB3 they’re dealing with which numbering system
Hex
What network storage technology does not allow block level access, abut allows reading/arriving entering files via a network
NAS
What wireless protocol supports 54 mbps st 5 ghz
803.11 a
What allows you to uniquely identify a complete connection among all other connections on the internet
A socket pair
Which layer of the OSI model connects to the ohsucial part of the network with the Abstract pair
Data link
Which layer of the OSI mod converts. It’s i to electric signals or light impulses for transmissions
Physical layer
Which VOIP protocol is an application layer protocol used for communication signaling
SIP
What technology separates a routers control plane from the data plane
Software defined networking
Data encapsulation and the protocol stack work on which of the following ways
Each protocol or service at each layer in the OSI models adds its own information to the data as it is passed down the protocol stack
Which of the following network devices blocks (ip) limited broadcast traffic by default
Router
What encryption method should be used to secure a wireless connection
WPA2
Which wireless technology leverages battery powered radios and it’s commonly used for building automation and control
Zigbee
What IPsec method offers integrity and authentication but not confidentiality
Ah
Authentication header
Which wireless technology could be employees when there are concerns about significant electromagnetic interference
Li-fi
What authentication mechanism exposes the password in plain text
PAP
Password authentication protocol
Which layer of the OSI model converts bitch into electrical signals or light impulses for transmission
Physical layer
Which of the following layers of the OSI model handles establishment maintenance of connections between systems
Session layer
Which protocol to Rellis used to Termine the path that should be taken by a packet
IP
Which network component should be used with there’s a concern about internal network sniffing
Switch
It is desire to have one layer to lan available on multiple switches in different countries so that each system can communicate directly using frames LA or two. What technology…
Vlan
What technology separates routers control plane from the data forwarding plane 
Software defined networking
Which of the following is hopeful that work patchable soon to that shows each of the notes on a path between the local machine and a destination
Traceroute
Which of the following is popular LAN based technology
Ethernet
Which plaintext VOIP IP protocol is frequently used to transfer audio or video data
RTP
What network storage technology does not allow black level access, but allows reading and writing entire files via network
NAS
What is the measure of the when the system will be available to begin processing recovery work before being put back into a normalized production mode
Recovery time objective
RTO
Also means when the hardware, software and infrastructure are capable to start doing any necessary recovery work required before operations are resumed properly
What is it called when the amount of data loss that is acceptable for a business function called?
RPO
recovery point objective
The dictates the amount of data that can be lost for a critical function
What is useful at protecting custom applications from common vulnerabilities (SQL injection, cross site scripting etc )
WAF
Web application firewall
What are the deployments available for WAF
Reverse proxy
Server install
Cloud hosted
What are WAF used for
Protection of an org public facing web apps
Can WAF be used to increase the security of off the shelf web app?
True
What is an IPS used for
Blocks traffic
Rather than alerting, the IPS will block suspicious traffic
Can have false pos which can be a self imposed DoS condition
Does a false positive on an IDS cause an availability issue?
No
What is the main emphasis of malware sandboxing?
Trying to render or execute files before passing the on, or personals providing a report after analysis
What prevents unknown/unlisted binaries from executing
application whitelisting
Antivirus software attempts to block what
Various forms of malware
What are some examples of malware
Virus
Worms
Trojan
Spyware
What involves simply making use of data about adversaries to improve security operations
IOC
Indicators of compromise
Is an IDS a passive system?
Yes
It sends alerts when malicious act is an occur
NIDS has three fundamental designs
Signature based
Protocol Analysis
Anomaly based
IDS Can operate in which two modes
Passive and active
Passive sends alerts but does not stop the attack
Active stops the attack usually be sending resets
Where does an IDS sit
On a network and sniffs traffic
RFCs
Request for comments
When are anomaly detection models used for
Small, well designed networks and in specific high risk cases
It alerts on anomalous behavior and is prone to false positives when behavior changes
What monitoring focuses on data leaving the org, system or interface
Engross monitoring
Monitoring oncoming traffic to an org or target system
Ingress
What does SIEm stand for
Security information and event management
What’s does a SEIM do
To deal with the volume and ease analysis of all the security related information and audit logs, a SEIM will go through all the logs and detect adversary tactics and problems.
What builds a behavior oriented profile of activity for both users and systems
UEBA
user and entity behavior analytics
What are some key monitoring tools?
IDS and SEIM
What type of logs can a SEIM Monitor
System/event logs
Web server logs
Firewall and proxy logs
And etc
What can be employed to ensure integrity of data remains
Digital signature
By default do syslogs provide integrity features that can confirm authenticity of the logs
No it does not
A third party utility like syslogw-NG does
Layer of OSI closest to the users and programs
Layer 7
Identification of communication partners
Determines security aspects of communication
Application layer
Layer 6
Provides representation of information to be processed by the application
Provides translations services such as EBCDIC and ASCII
Performs data encoding, compression and decompression
Presentation layer
Layer 5 Organizes communication Management of data exchange Maintains the session Allows half duplex and full duplex
Session layer
Layer 4 Optimizes network service usage Uniquely identifies end points Maintain communication integrity Error detection
Transportation layer
Layer 3 Provides network addressing Performs touring and flow control Establishes network connection Provides network path IPv4
Network layer
Layer 2
Formats messages to allow for transfer of physical media
Provides addressing for physical hardware
Ethernet or MAC addresses
Data link layer
Layer 1
Provides mechanical and electric activation, maintenance and deactivation oh physical connections for transmissions
Defines the ohh oak means of communication
Determines requirements for signal transmission. Over physical medium
Physical layer
What may be used to provide layer 2 authentication
802.1x
What layer of the OSI model connects the physical part of the network with the abstract
Data link
What DNS security protocol typically leverages browsers as the DNS client and provides increased confidentiality of DNS requests?
DoH
What layer of the OSI model interacts with informs and prepares it to be transmitted across the network
Transport layer
Dedicated security mode, this is not one
Systems handle multiple classification. Levels