501 Chapter 1 Flashcards

1
Q

Describes a goal an organization wants to achieve

A

use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ prevents unauthorized disclosure of data

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ scrambles the data

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ helps ensure that only authorized persons can access the data through Identification, Authentication, Authorization

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the practice of concealing a data on to another data

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the practice of making a data uninterpretable

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ provides assurance that the data has not changed. Ensures that no one has modified, tampered with or corrupted the data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ is a number created by a hashing algorithm

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

commonly used in emails, provides nonrepudiation

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an electronic password that allows a user to securely transfer data over the Internet using PKI

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ indicates that data and services are available when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

adds duplication to critical systems and provides fault tolerance

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the common goal of redundancy is to remove

A

SPOF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPOF stands for

A

Single Point of Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a redundancy technique: see RAID 1, RAID 5, RAID 10, allows a system to operate even if a disk fails

A

Disk Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a redundancy technique: see backup servers, remote servers

A

Server Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a redundancy technique: uses multiple servers to support a single service

A

Load Balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a redundancy technique: see alternate site or hot site where in the event of the original site is no longer capable of functioning

A

Site Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a site that is available 24/7 with employees

A

hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a site where employees need to go move to and start systems

A

cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a redundancy technique: see data backup, Grandfather-Father-Son backup

A

Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a redundancy technique: see UPS, Generator

A

Alternate Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a redundancy technique: reduces outages from overheating

A

Cooling Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

use a set of changes to update, improve or debug

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

basic goal of IT security is to

A

reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is the possibility or the likelihood of a threat exploiting a vulnerability resulting in a loss

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is any circumstance or event that has the potential to compromise confidentiality, integrity, availability

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is a weakness. It can be in hardware, software, configuration or OS

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is an adverse event or series of events that can negatively affect the CIA of an organization. includes: attacks, malware, data loss, etc

A

Security Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

reducing the risk or reducing the chance a threat will exploit a vulnerability: by implementing controls and many more actions to be discussed at later chapters

A

Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

reduces risk

A

Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

List the three primary control types

A

Technical Controls
Administrative Controls
Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

____ is a technical control used to protect the confidentiality of data.
This includes data transferred over a network and data stored in devices, such as servers, PC, mobile

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

once installed, provides protection against malware infection

A

Antivirus Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

both can monitor a network or host for intrusions and provide ongoing protection against various threats

A

IDS (Intrusion Detection System) and

IPS (Intrusion Prevention System).

36
Q

this restrict network traffic going in and out of a network

A

Firewall.

37
Q

specifies that individuals or processes are granted only the privileges they need to perform their assigned task or function

A

Least privilege

38
Q

are combinations of rights and permissions

A

Privileges

39
Q

____ use methods mandated by organizational policies or other guidelines

A

Administrative Controls

40
Q

these help quantify and qualify risks within an organization so that the organization can focus on the serious risks

A

Risk Assessments

41
Q

use cost and asset values to quantify risks based on the monetary value

A

quantitative risk assessment

42
Q

uses judgments to categorize risks based on probability and impact

A

qualitative risk assessment

43
Q

these attempts to discover current vulnerabilities or weaknesses

A

Vulnerability Assessments

44
Q

are a step further from vulnerability assessments by attempting to exploit these vulnerabilities

A

Penetration Tests

45
Q

many administrative controls are also known as ____

they help ensure that day-to-day operations of an organization comply with their overall security plan

A

operational or management controls

46
Q

training helps users maintain password security, follow a clean desk policy, understand threats such as phishing and malware and more

A

Awareness and Traning

47
Q

conf management use baselines to ensure the system started in a secure, hardened state.
change mgmt helps ensure that changes don’t result in unintended configuration errors”

A

Configuration and change management

48
Q

methods to help prepare for potential system outages

A

Contingency planning

49
Q

includes USB, external drives, backup tapes

A

Media protection

50
Q

such as cameras and door locks and heating and ventilation

A

Physical and environmental protection

51
Q

are any controls you can physically touch: lighting, signs, fences, security guards, etc

A

Physical Controls

52
Q

the goal is to prevent security incidents

A

Preventive Controls

53
Q

is the practice of making a system or application more secure than its default configuration.
This uses a defense-in-depth strategy with layered security: includes disabling unnecessary ports and services, implementing secure protocols, using strong passwords along with robust password policy and disabling default and unnecessary accounts”

A

Hardening

54
Q

ensuring that users are aware of security vulnerabilities and threats helps prevents incidents

A

Security Awareness and Training

55
Q

guards prevent and deter many attacks

A

Security Guards

56
Q

attempt to detect when vulnerabilities have been exploited resulting in an incident

A

Detective Controls

57
Q

logs record details of all traffic that firewall blocked

A

Log Monitoring

58
Q

monitor logs to detect trends by analyzing past logs

A

Trend Analysis

59
Q

examines the security posture of an organization

A

Security Audit

60
Q

CCTV system records activity and detects what occurred. can be used as a deterrent control too

A

Video Surveillance

61
Q

detect motion from potential intruders

A

Motion Detection

62
Q

attempt to reverse the impact of an incident or problem after it has occurred

A

Corrective Controls

63
Q

attempts to detect an attack and then modify the environment to block the attack from continuing

A

IPS

64
Q

backups ensure that personnel can recover data if it is lost or corrupted. also system recovery procedures

A

Backups and system recovery

65
Q

attempt to discourage a threat

A

Deterrent Controls

66
Q

deters thieves from stealing laptops

A

Cable Locks

67
Q

such as locked doors

A

Hardware Locks

68
Q

are alternative controls used instead of a primary control

A

Compensating Controls

69
Q

is a popular technology used within large data centers and can also be used on a regular personal computer.
It allows you to host one or more virtual systems or VMs (Virtual Machine) on a single physical system

A

Virtualization

70
Q

the software that creates, runs and manages the VMs

A

Hypervisor

71
Q

the physical system hosting the VMs

A

Host

72
Q

Operating systems running on the Host

A

Guest

73
Q

the ability to resize computing capacity based on the load

A

Host elasticity and scalability

74
Q

run directly on the system hardware. often called bare-metal hypervisors because they don’t need to run within an operating system

A

Type I

75
Q

run as software within a host operating system

A

Type II

76
Q

is a specialized version of a Type II hypervisor. It allows services or applications to run within their own isolated cells or containers. Containers don’t have a full operating system but instead, use the kernel of the host

A

Container Virtualization

77
Q

it captures the state of a VM at a moment in time. Administrators often take a snapshot before performing a risky operation.

A

Snapshot

78
Q

can occur if personnel within the organization don’t manage the VMs.

A

VM sprawl

79
Q

attack allow an attacker to access the host system from the VM. Primary protection for this is to keep the host and guests up to date with current patches.

A

VM escape

80
Q

can be used to check the connectivity; check name resolution; verify that routers, firewalls, and IPS system block ICMP

A

Ping command

81
Q

on windows allows you to view the configuration of network interfaces

A

Ipconfig command

82
Q

on Linux and MAC allows you to view the configuration of network interfaces

A

Ifconfig command

83
Q

allows you to view statistics for TCP/IP protocols and view all active network connections.
Can be useful if you suspect malware is causing a computer to connect with a remote computer

A

Netstat command

84
Q

lists the routers (also called hops) between two systems. It can be used to verify a path has not changed

A

Tracert command

85
Q

allows you to view and manipulate the ARP cache. This is useful is you suspect a system’s ARP cache has been modified during an attack

A

Arp (Address Resolution Protocol) command