Chapter 1 Flashcards

1
Q

What is use case?

A

Describes a goal that an organization wants to achieve. A use case can include actors, precondition, trigger, postcondition, normal flow, and alternate flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

Scrambles data to make it unreadable by unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is access control?

A

Identification, authentication, and authorization combined to ensure only authorized personnel can access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is steganography?

A

It obscure the data and can be used in a use case to support obfuscation. It attempts to make something unclear or difficult to understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is digital signature?

A

Provides authentication and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is disk redundancies?

A

Allow a system to continue to operate even if a disk fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is server redundancies?

A

Failover clusters include redundant servers and ensure a service will continue to operate, even if a server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is load balancing?

A

Uses multiple servers to support a single service and increase availability of web sites and web-based applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is site redundancies?

A

If a site can no longer function due to a disaster, the organization can move critical systems to an alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is backups?

A

Restore data is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of security control classification?

A

Technical, administrative, or physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of technical control?

A

It reduces vulnerability by using encryption, antivirus software, intrusion detection systems, firewalls, and least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is administrative controls?

A

Use methods mandated by organizational policies or other guidelines. Some methods include risk assessments, vulnerability assessments, and penetration tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between vulnerability assessments and penetration tests

A

Vulnerability assessment attempts to discover current vulnerabilities or weaknesses while penetration tests attempt to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is change management?

A

Helps ensure changes don’t result in unintended configuration errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is contingency planning?

A

Reduce the overall impact on the organization if an outage occur.

17
Q

What is hardening?

A

It is a practice of making a system or application more secure than its default configuration.

18
Q

What are examples of detective controls?

A

Log monitoring, trend analysis, security audit, video surveillance, and motion detection.

19
Q

What is IPS?

A

Intrusion prevention system attempts to detect attacks and then modify the environment to block the attack from continuing.

20
Q

What is deterrent controls?

A

Attempt to discourage threat.

21
Q

What is virtualization?

A

Allow you to host one or more virtual systems or VMs, on a single physical system. Provides high level of flexibility when testing security controls, updates, and patches.

22
Q

What is hypervisor?

A

The software that creates, runs, and manages the VMs.

23
Q

What is Type I hypervisors?

A

Run directly on the system hardware.

24
Q

What is Type II hypervisors?

A

Run as software within a host operating system.

25
Q

What is VM Escape?

A

It is an attack that allows an attacker to access the host system from within the virtual system.

26
Q

What is VM sprawl?

A

It occurs when an organization has many VMs that aren’t managed properly.

27
Q

What is ping?

A

Basic command used to test connectivity for remote systems. Use it to verify a system can resolve valid host names to IP.

28
Q

What is ipconfig?

A

Shows transmission control protocol/internet protocol (TCP/IP) configuration information for a system. Provides basic information about NIC (network interface cards).

29
Q

What is netstat?

A

Allow you to view statistics for TCP/IP protocols on a system. View active TCP/IP network connections.

30
Q

What is tracert?

A

Lists the routers between two systems. Each router is referred to as a hop. Tracert identifies the IP address and sometimes the host name of each hop in addition to the round-trip times for each hop.

31
Q

What is arp?

A

Resolves IP addresses to MAC addresses and stores the result in the ARP cache.