Lesson 17: Explaining Organizational and Physical Security Concepts Flashcards

1
Q

Define configuration management

A

Identifying and documenting all the infrastructure and devices installed at a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different aspects of configuration management?

A
  1. Service assets
  2. Configuration Item (CI)
  3. Baseline Document
  4. Configuration management system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a service asset

A

Things, processes, or people that contribute to the delivery of an IT service. Each asset must be identified by some sort of label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a configuration item (CI)

A

An asset that requires specific management procedures for it to be used to deliver the service. CIs are defined by their attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a baseline document

A

Approved or authorized state of a CI; This allows auditing processes to detect unexpected or unauthorized change. A baseline can be a configuration baseline (the ACL applied to a firewall, for instance) or a performance baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a configuration baseline?

A

Settings for services and policy configuration for a network appliance or for a server operating in a particular application role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a configuration management system (CMS)

A

A Configuration Management System (CMS) is the tools and databases that collect, store, manage, update, and present information about CIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define change management

A

Process for approving, preparing, supporting, and managing new or updated business processes or technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Summarize a standard change management process

A

The need or reasons for change and the procedure for implementing the change is captured in a Request for Change (RFC) document and submitted for approval. The RFC will then be considered at the appropriate level and affected stakeholders will be notified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a request for change (RFC) document?

A

To have the pending changes in writing and allows for approval at appropriate level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a standard operating procedure (SOP)

A

Documentation of best practice and work instructions to use to perform a common administrative task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define an audit report

A

Detailed and specific evaluation of a process, procedure, organization, job function, or system, in which results are gathered and reported to ensure that the target of the audit is in compliance with the organization’s policies, regulations, and legal responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between an audit report and an assessment report?

A

An audit report focuses on identifying and documenting assets, an assessment report evaluates the configuration and deployment of those assets, such as deviation from baseline configuration or performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is system life cycle?

A

Method to track the life cycle phases of one or more hardware, service, or software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of physical network diagrams?

A
  1. Floor plan
  2. Wiring Diagram
  3. Distribution Frame
  4. Wireless Site Survey
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a distribution frame diagram?

A

A port location diagram identifies how wall ports located in work areas are connected back to ports in a distribution frame or patch panel and then from the patch panel ports to the switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of distribution frames?

A
  1. Intermediate Distribution Frame (IDF)
  2. Main Distribution Frame (MDF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define an Intermediate Distribution Frame (IDF)

A

Passive wiring panel providing a central termination point for access layer switches that serve a given area, such as a single office floor. Each IDF has a trunk link to the MDF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define a Main Distribution Frame (MDF)

A

Passive wiring panel providing a central termination point for cabling. A MDF distributes backbone or “vertical” wiring through a building and connections to external access provider networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are types of logical network diagrams

A
  1. Physical layer
  2. Data link layer (L2)
  3. IP Layer (L3)
  4. Application layer (L4)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What information would be included in a physical layer (L1) logical diagram

A

Asset IDs and cable links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What information would be included in a data link layer (L2) logical diagram?

A

Interconnections between switches and routers, with asset IDs (or the management IP of the appliance), interface IDs, and link-layer protocol and bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What information would be included in a logical network (L3) diagram?

A

IP addresses of router interfaces (plus any other static IP assignments) and firewalls, plus links showing the IP network ID and netmask, VLAN ID (if used), and DHCP scopes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What information would be included in a logical application layer (L4) diagram?

A

Server instances and TCP/UDP ports in use. You might also include configuration information and performance baselines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define an incident response plan (IRP)

A

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define an incident

A

When security is breached or there is an attempted breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the main goals during incident response?

A
  1. Protect confidential data and minimize impact
  2. Preserve evidence
  3. Follow-up analysis to prevent reoccurrence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the main conflict when planning incident response?

A

Protecting data and minimizing impact while preserving evidence for analysis against efficiency and business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define a disaster recovery plan (DRP)

A

Documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of a disaster recovery plan (DRP)

A
  1. Identify scenarios for natural and non-natural disasters and options for protecting systems.
  2. Identify tasks, resources, and responsibilities for responding to a disaster. Disaster recovery focuses on tasks such as switching services to failover systems or sites and restoring systems and data from backups.
32
Q

Define a business continuity plan (BCP)

A

Collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.

33
Q

How is a business continuity plan created?

A

By performing business impact analysis (BIA) and IT contingency planning (ITCP)

34
Q

What is the role of Business Impact Analysis (BIA) when creating a business continuity plan (BCP)?

A

Identifies mission essential and primary business functions and the risks that would arise if the organization cannot fulfill them.

35
Q

What is the role of IT contingency planning (ITCP) when creating a business continuity plan (BCP)?

A

Ensures that the business’ processes are supported by resilient IT systems, working to identify and mitigate all single points of failure from a process or function

36
Q

What is the purpose of a security policy?

A

Establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job

37
Q

What are the best practice security measures that should be taken during the onboarding process?

A
  1. Background check
  2. Identity and access management (IAM) - creating user accounts and privileges
  3. Asset allocation
  4. Training on polices
38
Q

What are the best practice security measures that should be taken during the offboarding process?

A
  1. Identity and access management (IAM) - disabling user accounts and privileges
  2. Retrieving company assets
  3. Returning personal assets
  4. Resetting generic account credentials
39
Q

What is the purpose of a password policy?

A

Promotes user selection of strong passwords by specifying a minimum password length, requiring complex passwords, requiring periodic password changes, and placing limits on reuse of passwords

40
Q

What is best practice for password length?

A

12 to 16 characters - passphrases are best

41
Q

What is best practice for password complexity?

A

Varying the characters in the password makes it more resistant to dictionary-based attacks

42
Q

What is best practice for password age/history?

A

Requiring that the password be changed periodically and preventing the reuse of previously selected passwords

43
Q

What is the purpose of an acceptable use policy (AUP)?

A

Policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

44
Q

What is the purpose of a bring your own device policy (BYOD)?

A

The mobile is owned by the employee and can be used on the corporate network so long as it meets a minimum specification required by the company (in terms of OS version and functionality). The employee will have to agree on the installation of corporate apps and to some level of oversight and auditing

45
Q

Define a data breach

A

The theft or loss of confidential and/or personal information.

46
Q

What can be leveraged to prevent data breaches or lass of data?

A

Data loss prevention (DLP) software detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

47
Q

What is the purpose of a service level agreement (SLA)?

A

Agreement that sets the service requirements and expectations between a consumer and a provider.

48
Q

What is typically in service level agreement (SLA)?

A

Aspects of the service, such as scope, performance characteristics, and responsibilities that are agreed upon between the service provider and the customer.

49
Q

Define a non-disclosure agreement (NDA)

A

Agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties.

50
Q

What is a memorandum of understanding (MOU)?

A

A preliminary or exploratory agreement to express an intent to work together; intended to be relatively informal and not to act as binding contracts.

51
Q

What are 3 physical means of access control for an area/building/room?

A
  1. Badge reader
  2. Biometric
  3. Access control vestibule (mantrap)
52
Q

Define an access control vestibule (mantrap)

A

Secure entry system with two gateways, only one of which is open at any one time.

53
Q

What are 3 physical access controls for IT assets?

A
  1. Locking racks
  2. Locking cabinets
  3. Smart lockers with badge/biometric control
54
Q

What are the two detection based physical access controls?

A
  1. Cameras (with audio as well)
  2. Asset tags
55
Q

What type of asset tag allows for electronic tracking?

A

RFID asset tags allow detection to prevent theft

56
Q

What are two types of physical alarms

A
  1. Circuit based
  2. Motion detection
57
Q

Define a circuit based alarm

A

Sounds when the circuit is opened or closed; this could be caused by a door or window opening or by a fence being cut.

58
Q

What is the most secure from of circuit based alarm?

A

Closed-circuit alarm is more secure because an open circuit alarm can be defeated by cutting the circuit.

59
Q

How does motion detection function?

A

Alarm is linked to a sensor that detects moving heat sources with microwave radio reflection or passive infrared (PIR).

60
Q

Define a hardened Protected Distribution System (PDS)

A

Cabling is routed through sealed metal conduit and subject to periodic visual inspection.

61
Q

Define data remnants removal

A

Ensuring that no data is recoverable from hard disk drives (HDDs), flash devices or solid state drives (SSDs), tape media, CD, DVD ROMs, or paper documents before they are disposed of or put to a different use.

62
Q

What are the main methods of data destruction?

A
  1. Incineration
  2. Pulverization
  3. Degaussing (HDDs, SSDs)
63
Q

Define zero-filling

A

From of sanitization/overwriting which just sets each bit to zero

64
Q

What is the most secure way to perform zero-filling?

A

Overwrite the content with one pass of all zeros, then a pass of all ones, and then one or more additional passes in a pseudorandom pattern.

65
Q

Define secure erase (SE)

A

Method of sanitizing a drive using the ATA command set to automatically preform a single pass of zero-filling.

66
Q

What is the downside to secure erase (SE)

A

Only works for HDDs due to how SSDs write memory

67
Q

Define Instant Secure Erase (ISE)

A

Media sanitization command built into self-encrypting HDDs and SSDs that works by erasing the encryption key, leaving remnants unrecoverable.

68
Q

Define IoT (Internet of Things)

A

Global network of personal devices, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity.

69
Q

What are two types of consumer grade IoT devices?

A

1.Hub/control system
2. Smart devices
3. Physical access control system (PACS)

70
Q

What are examples of a Hub/control system?

A

Devices that require a communications hub to function; wireless speakers/headset

71
Q

What are examples of smart devices?

A

Devices are capable of compute, storage, and network functions; smart lightbulb, fridge, thermostat

72
Q

Define a physical access control system (PACS)

A

Components and protocols that facilitate the centralized configuration and monitoring of security mechanisms.

73
Q

What makes up physical access control system (PACS)?

A

A network of monitored locks, intruder alarms, and video surveillance cameras.

74
Q

What is a principal requirement of IoT networking technologies?

A

Low power consumption and low latency.

75
Q

Define the Z-Wave protocol

A

A wireless communications protocol used primarily for home automation and creates a mesh network topology

76
Q

Define Narrowband-IoT (NB-IoT) and its purpose

A

A low-power version of the Long Term Evolution (LTE) used for sending small packets with low latency