Threat Evaluation Flashcards

1
Q

What is needed to properly evaluate threats?

A

Good threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What information does threat intelligence provide for evaluation?

A

The severity of threats, how quickly they might spread, attack techniques used, and potential mitigation methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What mindset should be adopted during threat evaluation?

A

Thinking like an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does being ‘thorough’ in threat evaluation entail?

A

Looking for all possible ways to attack, not just the most obvious ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is realism important in threat evaluation?

A

To focus preparation on plausible events rather than highly improbable or irrelevant ones (like a meteorite strike).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should be prepared for instead of an improbable event like a meteorite?

A

The consequence of the improbable event (e.g., loss of the datacenter, regardless of cause like fire, flood, or meteorite).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘completeness’ mean in threat evaluation?

A

Examining all of the various attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it important to review assumptions based on past events?

A

Because things could be changing, and past occurrences are not always an accurate predictor of future possibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What aspects of the proposed operating environment need consideration?

A

How the system connects (wired, wireless, etc.), network location (isolated, DMZ), and use of shared resources (like databases).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are integrated operations important to evaluate?

A

Because most systems have dependencies on other systems (e.g., needing input from upstream processes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What checks are needed for data received from other systems?

A

Ensuring completeness (no missed files/transactions) and preventing duplication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technique can help verify file transfer integrity between systems?

A

Using header and trailer records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a common reason for systems being compromised related to setup?

A

Misconfiguration, often because installers lack knowledge on how to secure the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some physical environmental issues that can pose risks?

A

Dust, heat, freezing, and liquids.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can users impact system risk?

A

Their level of experience or comfort with technology can be a factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to consider future needs during the design phase?

A

To forecast potential changes in business processes or regulations and build in the capability to support future operations.