Ch9: Implementing Controls to Protect Assets Flashcards

1
Q

Layered security/defense-in-depth practices

A

uses control diversity, implementing administrative, technical, and physical security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vendor diversity

A

utilizes controls from different vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User training

A

informs users of threats, helping them avoid common attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the event of a fire, door access systems should…

A

allow personnel to exit the building without any form of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access points to data centers and server rooms should be limited to…

A

a single entrance and exit whenever possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Proximity cards

A

credit-card sized access cards. Users pass the card near a proximity card reader and it reads data on the card. Some access control points use proximity cards with PINs for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Door access systems include

A

cipher locks, proximity cards, and biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cipher locks do not…

A

identify users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proximity cards can…

A

identify and authenticate users when combined with a PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biometrics can..

A

identify and authenticate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tailgating

A

a social engineering tactic that occurs when one user follows closely behind another user without using credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mantraps

A

allow only a single person to pass at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sophisticated mantraps can

A

identify and authenticate individuals before allowing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Video surveillance provides

A

reliable proof of a person’s location and activity. It can identify who enters and exits secure areas and record theft of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These provide physical security

A

fencing, lighting, and alarms. Often used together to provide layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To increase the effectiveness of fencing, lighting, and alarms, use…

A

motion detection methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Infrared detectors…

A

detect movement by objects of different temperatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Barricades

A

provide stronger barriers than fences and attempt to deter attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bollards

A

effective barricades that can block vehicles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Effective threat deterrents for small equipment such as laptops and workstations

A

cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Locked cabinets prevent…

A

unauthorized access to equipment mounted in server bays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Higher-tonnage HVAC systems

A

provide more cooling capacity. This keeps server rooms at lower temperatures and results in fewer failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HVAC systems increase…

A

availability by controlling temperature and humidity

24
Q

Temperature controls help ensure

A

a relatively constant temperature

25
Q

Humidity controls

A

reduce the potential for damage from elecrostatic discharge and damage from condensation

26
Q

HVAC systems should be integrated with

A

fire alarm systems and either have dampers or the ability to be turned off in the event of a fire

27
Q

EMI shielding

A

Electromagnetic interference (EMI) shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable

28
Q

Cable troughs

A

protect cables distributed throughout a building in metal containers

29
Q

Faraday cage

A

prevents signals from emanating beyond the cage

30
Q

Single point of failure is

A

any component whose failure results in the failure of an entire system

31
Q

Elements to remove single points of failure include

A

RAID, failover clustering, UPSs, and generators

32
Q

RAID is an inexpensive method to

A

add fault tolerance and increase availability

33
Q

RAID-5

A

can survive the failure of one disk

34
Q

RAID-6

A

can survive the failure of two disks

35
Q

Failover clusters

A

are one method of server redundancy and they provide high availability for servers, removing one server as a single point of failure

36
Q

Load balancing

A

increases the overall processing power of a service by sharing the load among multiple servers

37
Q

Scheduling methods (load balancing)

A

round-robin and source IP address affinity

38
Q

Source IP address affinity scheduling

A

ensures clients are redirected to the same server for an entire session

39
Q

Full backup

A

For unlimited time and money, this provides the fastest recovery time

40
Q

Full/incremental backup

A

reduces the amount of time needed to perform backups

41
Q

Full/differential

A

reduces the amount of time needed to restore backups

42
Q

Best way to test the integrity of a company’s backup data

A

test restores

43
Q

Backup media should be protected with…

A

the same level of protection as the data on the backup

44
Q

Geographic considerations for backups

A

storing backups off-site, choosing the best location, considering legal implications and sovereignty

45
Q

BIA

A

The Business Impact Analysis identifies mission-essential functions and critical systems that are essential to the organization’s success. Identifies maximum downtime limits for these systems, various scenarios that can impact these systems, and potential losses from an incident

46
Q

Privacy threshold assessment

A

typically a simple questionnaire completed by system or data owners that helps identify if a system processes data that exceeds the threshold for PII

47
Q

Privacy impact assessment

A

For systems that process PII, helps identify and reduce risks related to potential loss of the PII

48
Q

RTO

A

The recovery time objective identifies the maximum amount of time it should take to restore a system after an outage. Derived from the maximum allowable outage time in the BIA. RPO refers to the amount of data you can afford to lose

49
Q

Hot site

A

includes personnel, equipment, software, and communication capabilities of the primary site with all the data up to date. Provides the shortest recovery time (compared to warm and cold sites) and is the most effective disaster recovery solution, but also most expensive to maintain

50
Q

Cold site

A

will have power and connectivity needed for a recovery site, but little else. Least expensive and hardest to test

51
Q

Warm site

A

compromise between hot site and a cold site (e.g. contains all necessary hardware, but not all data is up-to-date)

52
Q

Mobile site

A

does not have a dedicated location but can provide temporary support during a disaster

53
Q

DRP

A

Disaster Recovery Plan includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan

54
Q

Final phase of disaster recovery includes

A

a review to identify any lessons learned and may include an update of the plan

55
Q

You can validate BCPs (business continuity plans) through

A

testing

56
Q

Tabletop exercises are

A

discussion-based only and are typically performed in a classroom or conference setting

57
Q

Functional exercieses are

A

hands-on exercises