701 - Chapter 1 Flashcards

1
Q

What prevents the unauthorized disclosure of information, it keeps secret information secret?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What prevents the unauthorized alteration of information or systems. It keeps our information safe from unintentional or accidental changes.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What insurer authorized users are able to access information and systems when they need them?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two ways to ensure confidentiality?

A

Encryption and access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Within access controls, what are the three core identity and access management activities that help ensure that only authorized person can access data?

A

Identification, authentication, authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Within access controls, users claim and identity with a unique username. What is this called?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Within access control, what is it called when users prove their identity for example with a password?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within access control, this can grant or restrict access to resources uses using such things as permissions, what is this called?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You can increase availability by adding what and what? Give some examples.

A

Fault tolerance, and redundancy… RAID, failover clusters, backups, generators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common goal of fault tolerance, and redundancy techniques?

A

To remove each single point of failure, SPOF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAID is an example of what type of redundancy?

A

Disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Failover clusters are an example of what type of redundancy?

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Load balancing uses multiple servers to support a single service such as a high volume website, what type of redundancy is that?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UPS and power generators can provide power to key systems if commercial power fails, what type of redundancy is this?

A

Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called to put two or more network cards in a single server? And what type of redundancy is this?

A

NIC teaming…network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two things that can contribute to high availability?

A

Scalability and elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of scalability?

A

Horizontal and vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adding additional servers would be an example of this type of scalability? Adding additional resources (for example, adding more RAM) to the existing servers is an example of this type of scaling?

A

Horizontal and vertical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is called when scalability is automated by having the system add and remove resources as needed?

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an alternative to seeking the highest possible availability?

A

resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Resiliency methods help system _____ themselves or recover from _____ with minimal downtime?

A

Heal and Faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resiliency methods also expect components to do what with fail processes? Give an example.

A

Retry… Examples would include the chrome browser and also TCP packets, when failing to reach the destination, TCP packets will be resent

23
Q

Organizations frequently need to balance resource availability with what? And why is this difficult to do?

A

Security constraints… it is difficult because when applying security constraint, such as encryption, it will require more memory and processing power in addition to slowing down applications

24
Q

What is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss?

25
What is any circumstance or event that has the potential to compromise CIA?
Threat
26
What is another name for a weakness?
A vulnerability
27
What is an adverse event or series of events that can negatively affect the CIA of an organizations IT?
A security incident
28
What are four types of threats?
Insider, an outside attacker, natural, accidental
29
What is the process of reducing the chances that a threat will exploit of vulnerability or reduces the impact of the threat?
Risk mitigation
30
What do organizations implement to help mitigate risk?
Security controls also called counter measures and safeguards
31
What are some examples of technical controls?
Encryption, antivirus software, IDS and IPS, firewalls , least privilege
32
Where are managerial controls typically documented?
In an organizations written security policy
33
What type of control is implemented by people who performed the day-to-day operations to comply with an organizations overall security plan?
Operational controls
34
What are three ways of assessing risk within managerial controls?
Quantitative and qualitative risk assessments, vulnerability assessments
35
What are the three families of operational controls?
Awareness and training, configuration management, media protection
36
Name some examples of the preventative control type?
Hardening, training, security guards, account disablement process, IPS
37
What control type is put in place to discourage a threat? Give some examples.
Deterrent… Warning signs and login banners
38
This type of control is used to discover an event after it has occurred? Give some examples.
Detective… Log monitoring, SIEM Systems, security audit, video surveillance, motion detection, IDS
39
This control type attempts to reverse the impact of an incident or problem after it has occurred? Give some examples.
Corrective… Back ups/system recovery and incident handling processes
40
This control type provides an alternate control instead of using a primary control?
Compensating
41
This control type is designed to provide instruction to individuals and how they should handle security related situations that arise? Give some examples.
Directive… Policy, standards, procedures, guidelines and change management
42
What are the three primary windows operating system logs?
Security, system, application
43
What directory does Linux Systems store logs in?
/var/log
44
Which Lennox log contain a wide variety of general system Messages including startup, mail, kernel messages?
Syslog or messages
45
Which Linux log contains information related to authentication and authorization of user sessions?
Secure log
46
What are three examples of network logs?
Firewall, IPS/IDS, packet captures
47
What is the type of application log that follows the W3C common log format?
Web server logs
48
Within an SIEM system, what is called the process of combining several similar items into a single similar format?
Log aggregation
49
Within an SIEM system, what is the software component used to collect an analyze event log data from various systems within the network?
The correlation engine
50
Within an SIEM system, this focuses on what users are doing such as application and network activity, and is looking for abnormal patterns of activity that may indicate malicious intent?
User behavior analysis, UBA
51
What are the agents that an SIEM system places on Systems throughout a network called? These collect logs and send the logs to the SIEM system.
Sensors
52
What are some common elements in a SIEM dashboard?
Sensors, alerts, correlation, trends
53
What is the protocol that specifies a general log entry format and the details on how to transport log entries?
Syslog
54
The system sending Syslog messages is called what? And what is the recipient of the syslog entries?
Originators and collectors