Ch 1. Mastering the Basics Flashcards

Presents the basics for understanding security. (36 cards)

1
Q

Use Case

A

used to identify and clarify requirements to achieve a goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

prevent the unauthorized disclosure of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

scrambles data to make it unreadable by unauthorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three elements of Access Controls?

A

Identification, Authentication, Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steganography

A

practice of hiding data within data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three methods of Confidentiality?

A

Encryption, Access Controls, Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A

provides assurances that data has not changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash

A

a number created by a executing a hashing algorithm against data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Signature

A

use certificates and a Public Key Infrastructure to verify integrity and provide authentication and N-R

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two methods of Integrity?

A

Hashing and Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

indicates that data and services are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Redundancy

A

adds duplication to critical systems and provides fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Patch

A

code that resolves software bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two methods of Availability?

A

Redundancy and Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk

A

the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat

A

any circumstance or event that has the potential to compromise confidentiality, integrity, or availability

17
Q

Vulnerability

18
Q

Security Incident

A

an adverse event that can negatively affect the confidentiality, integrity, or availability of an org’s IT and data

19
Q

Risk Mitigation

A

reducing risk through the implementation of controls, countermeasures, or safeguards

20
Q

Types of Control Implementation

A

Technical, Administrative, Physical

21
Q

Types of Control Goals

A

Preventative, Detective, Deterrent, Corrective, Compensating

22
Q

Hypervisor

A

the software that creates, manages, and runs the VM

23
Q

NIST

A

National Institute of Standards and Technology; publishes SPs in the 800 series

24
Q

Type I Hypervisor

A

run directly on the system hardware

25
Type II Hypervisor
runs as software within a host operating system
26
Application Cell
runs services or applications within isolated application containers
27
Snapshot
provides with you with a copy of a VM at a moment in time
28
VM Escape
an attack that allows an attacker to access the host system from within the virtual system
29
VM Sprawl
occurs when an organization has many VMs that aren't managed properly
30
ICMP
Internet Control Message Protocol
31
NIC
Network Interface Controller
32
VDI/VDE
Virtual Desktop Infrastructure / Virtual Desktop Environment
33
TCP
Transmission Control Protocol; allows comps to share resources across a network
34
UDP
User Datagram Protocol; like TCP, but used for low latency and loss tolerant programs
35
tracert
command used to trace the path of an IP packet
36
ARP
Address Resolution Protocol; resolves IP addresses to MAC addresses and stores the results in an ARP cache