Chapter 11 - Security Operations Flashcards

1
Q

Due Care vs Due Diligence

A

Due Care is keeping things maintained and due diligence is “look before you leap”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Accountability

A

Checking audit logs and enabling audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clipping Level

A

How many errors trigger an action or discipline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational Assurance

A

Ensure the product architecture and features are implemented securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Life-Cycle Assurance

A

Ensure design, testing and configuration management is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What to look out for?

A

Unusual Occurrences
Deviation from Standard
Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IO Controls

A

Transactions should be timestamped and recorded
Input Validation
Output should only reach intended requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System Hardening

A

Lock that door, configure a password, SSL enable.. etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Licensing

A

Business Software Assurance (BSA) will get you if you dont license and pirate corporate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acceptable Use Policy

A

This is used to control what users can install and use on the technology the company provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change Control

A

Used to document system changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sanitized data

A

Contents deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purging data

A

Contents deleted, and zeroization or degaussing occurs on the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Remanence

A

Residual data left over after sanitizing or purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Object Reuse

A

Giving a hard drive away to your grandma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MTBF

A

Mean time between failures is the estimated lifetime of equipment calculated by the vendor

17
Q

MTTR

A

Mean time to repair is how long a broken device takes to repair

18
Q

MAID

A

Massive array of inactive disks meant as a write mostly disk array

19
Q

RAIT

A

Redundant array of independent tape - the economical write mostly data array, which is to tape and set/forget

20
Q

Clustering vs Grid Compute

A

In Grid compute the nodes do not trust each other and work independently toward the common goal, cluster has cross talk between nodes, grid does not.

21
Q

Hierarchical storage management

A

Multitier backup storage, Disk, Tape, and Optical

22
Q

Mainframe

A

Differs from PC compute by having more processors in key places, like at the disk, network, and peripherals

23
Q

Supercomputer

A

Like a mainframe, but tuned and dialed in to parallelize a specific function (like an algorithm)

24
Q

Operators

A

Name used on the exam for mainframe operators

25
Q

Facsimile Security

A

Fax encryption can be used to bulk encrypt fax server communication

26
Q

OS fingerprinting

A

Tapping computers to find out the OS based of certain pattern responses.

27
Q

Port knocking

A

Setup of two ports, one for service and one for opening the service in a session. Knock port should log verbosely.

28
Q

LOKI

A

ICMP header communication

29
Q

Mail Bombing

A

Overloading a mail system

30
Q

Ping of Death

A

Oversized ICMP attack

31
Q

Slamming and Cramming

A

Changing service providers without you knowing and inserting bogus charges

32
Q

Vulnerability Guidelines

A

Must have management consent
Personnel testing (social engineering)
Physical testing (can I push the power button)
System/Networking test (can I digitally get to it)

33
Q

Penetration Testing

A

Actually attempting various attacks to uncover vulnerabilities

34
Q

Get out of jail card

A

You need a document to protect you from prosecution and a contact to protect you. Contracts help.

35
Q

What are the levels of knowledge assessment?

A

Zero, partial, and full knowledge assessments

36
Q

Blind vs Double Blind

A

Blind - Public knowledge only

Double Blind - Security staff doesnt know either