CH1 Mastering Security Basics Flashcards

(77 cards)

1
Q

True or False:
Confidentiality, integrity, and availability form the CIA security triad, which is a model used to guide an organization’s security principles.

A

True

Page 2822

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the security triad described as?

A

A model used to guide an organization’s security principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name of the model used to guide an organization’s security principle’s ?

A

Security/CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What factors make up the security triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CIA stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, Integrity, and Availability are factors for what model?

A

Security/CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What describes a goal that an organization wants to achieve?

A

Use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A use case describes what?

A

A goal that an organization wants to achieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a common naming convention for a use case?

A

Verb-noun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example(s) of a well named use case

A

Place order

Login to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What common elements make up a use case?

A
  1. Actors
  2. Precondition
  3. Trigger
  4. Post condition
  5. Normal flow
  6. Alternate flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Match the elements below with their definitions

  1. Alternate flow
  2. Post condition
  3. Precondition
  4. Trigger
  5. Actors
  6. Normal flow

A. Starts the use case
B. Occurs after the process is triggered
C. General steps a process follows
D. Exception steps a process could follow
E. An entity which performs an action
F. Required to be done before so the process can begin

A
1, D
2, B
3, F
4, A
5, E
6, C
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List a few elements of a use case

A
  1. Actors
  2. Precondition
  3. Trigger
  4. Post condition
  5. Normal flow
  6. Alternate flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does confidentiality do?

A

Prevents the unauthorized disclosure of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the prevention of unauthorized disclosure of data known as?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What scrambles data to make it unreadable by unauthorized entities?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does encryption do?

A

Scrambles data to make it unreadable by unauthorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does AES stand for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does DES stand for?

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List three access control elements

A
  1. Identification
  2. Authentication
  3. Authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is identification?

A

Unique attributes that make up an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Authentication?

A

The process of determining if an entity is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Authorization?

A

The process of determining what permission an entity has for data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Match the term to the meaning

  1. Identification
  2. Authorization
  3. Authentication

A. The process of determining what permission an entity has for data and systems
B. The unique attributes that make up an entity
C. The process of determining if an entity is who they claim to be

A

1, B
2, A
3, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Access controls are used to ______ and ______ access A. Prevent, Protect B. Grant, Restrict C. Prime, Lock D. Test, Break
B. Grant, Restrict
26
What is the best way to protect data confidentiality?
Encryption
27
# Choose all answers that are true Encryption is ____ A. The act of scrambling data to be unreadable to unauthorized users B. Not used to secure data C. The best way to protect data confidentiality D. A protocol only used by hackers
A. The act of scrambling data to be unreadable to unauthorized users and C. The best way to protect data confidentiality
28
What helps to protect confidentiality?
Access controls
29
______ provides assurance that data has not changed
Integrity
30
What does integrity provide assurance of?
That data has not changed
31
Integrity provides assurance that _____ has not ____
Data has not changed
32
What causes a loss of integrity? A. Unauthorized change to data B. Unintended changes C. System errors D. All of the above
D. All of the above
33
List a technique which enforces integrity
Hashing
34
Hashing is a technique which enforces _____
Integrity
35
What does SHA stand for with respect to data integrity? A. Secure Hashing Access B. Secure Hashing Ability C. Secure Hashing Availability D. Secure Hashing Algorithm
D. Secure Hashing Algorithm
36
What does a hashing algorithm do? A. Generates a variable length of reversible output B. Encrypts data using a key C. Creates a fixed length of irreversible output D. Obfuscates data
C. Creates a fixed length of irreversible output
37
How does a hashing algorithm ensure integrity? A. It doesn't B. Comparing hash outputs on the same data during different times. If they match the data has not changed.
B.
38
True or False: Hashes identify what has changed in data
False It can only generate output used for comparison. It does not indicate what differences exist
39
What are some ways hashing is used to ensure data integrity? A. Sending/Receiving e-mail B. Downloading files C. Uploading files D. Migrating data
A. Sending/Receiving e-mail and B. Downloading files
40
True or False Availability means data and services are available when needed.
True
41
What is used to ensure high levels of availability in organizations? A. Fault tolerance B. Encryption C. Redundancy D. Hashing
A. Fault tolerance | C. Redundancy
42
Fault tolerance and ______ are used to ensure high levels of availability
Redundancy
43
Redundancy and _____ _____ are used to ensure high levels of availability
Fault tolerance
44
Redundancy adds ____ to critical systems A. Decoupling B. Complexity C. Duplication D. Encryption
C. Duplication
45
Duplication is added to critical systems for A. Reversal B. Removal C. Regression D. Redundancy
D. Redundancy
46
Fault tolerance is the ability to A. Prevent disruption in service B. Manage large loads of data C. Segregate roles and responsibilities D. Remove malicious software
A. Prevent disruption in service
47
A goal of redundancy and fault tolerance is to remove: A. Worms B. Viruses C. Single Points of Failure D. Spyware
C. Single points of failure
48
What does SPOF stand for?
Single points of failure
49
True or False An SPOF is a failure that causes an entire system failure
True
50
An SPOF is a failure that causes A. Minimal outages B. Intermittent system failure C. Entire system failure D. Partial system failure
C. Entire system failure
51
Match the fault tolerance and redundancy methods with their definitions 1. Disk redundancies 2. Server redundancies 3. Network redundancies 4. Power redundancies A. Multiple communication paths B. Multiple servers C. Multiple disks D. Multiple power sources
1, C 2, B 3, A 4, D
52
RAID-1, RAID-5, RAID-10, and backups are configurations of which fault tolerance and redundancy method? A. Disk redundancies B. Server redundancies C. Network redundancies D. Power redundancies
A. Disk redundancies
53
Failover clusters are configurations of which fault tolerance and redundancy method? A. Disk redundancies B. Server redundancies C. Network redundancies D. Power redundancies
B. Server redundancies
54
Load balancing and network interface card teaming are configurations of which fault tolerance and redundancy method? A. Disk redundancies B. Server redundancies C. Network redundancies D. Power redundancies
C. Network redundancies
55
Uninterruptible power supplies and power generators are examples of which fault tolerance and redundancy method? A. Disk redundancies B. Server redundancies C. Network redundancies D. Power redundancies
D. Power redundancies
56
Scalability and elasticity contribute to ____ ____ A. Low availability B. Intermittent availability C. High availability D. Remote availability
C. High availability
57
The difference between scalability and elasticity is A. Scalability is for static configurations and elasticity is for dynamic configurations B. The amount of hardware required C. The amount of software required D. The amount of cost
A. Scalability is for static configurations and elasticity is for dynamic configurations
58
Scaling up/out ____ resources. Scaling down/in_____ resources
Increases, decreases
59
Cloud resources typically have _____ capability A. Static B. Dormant C. Elastic D. Diverse
C. Elastic
60
Another method of ensuring availability is A. Encrypting B. Hashing C. Authenticating D. Patching
D. Patching
61
______ helps systems heal themselves and recover from faults with minimal downtime
Resiliency
62
True or False Resiliency methods are similar to high availability methods of redundancy and fault tolerance
True
63
Resiliency incorporates _______ failed sequences
Retrying
64
Organizations frequently need to balance resources with _______ A. Data integrity B. Scalability C. Security constraints D. Redundancy
C. Security constraints
65
Why is there a need to balance resources and security constraints? A. Costs B. Time C. Availability D. Confidentiality
A. Costs To implement highest security constraints can be costly and are result in a company not being profitable
66
_____ is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss. A. Resources B. Redundancy C. Reputation D. Risk
D. Risk
67
Risk is A. When there are no threats to an exploited vulnerability B. When all systems are operational with no issues C. The basics of security D. When there is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
D. When there is the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss
68
A ______ is a weakness.
Vulnerability
69
A vulnerability is known as a ______ in security
Weakness
70
A ________ is an adverse event or series of events that can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.
Security incident
71
True or False A security incident is an adverse event or series of events that can negativity affect the confidentiality, integrity or availability of an organization's information technology (IT) systems and data
True
72
A security event can include which of the following: A. Intentional attacks B. Malicious software (malware) infections C. Accidental data loss D. All of the above
D. All of the above
73
_________ reduces the chances that a threat will exploit a vulnerability.
Risk mitigation
74
Risk mitigation A. increases the chances that a threat will exploit a vulnerability. B. has no impact on the chances that a threat will exploit a vulnerability. C. reduces the chances that a threat will exploit a vulnerability. D. All of the above
C. reduces the chances that a threat will exploit a vulnerability.
75
What is used to reduce risk? A. Containers B. Constants C. Controls D. Contents
C. Controls
76
True or False You can't prevent most threats
True
77
True or False You can only reduce the risk of threats
True