Chapter 1 Flashcards

(73 cards)

1
Q

CIA security Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Use Case

A

A goal that an organization wants to achieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

prevents the unauthorized disclosure of data. In other words, authorized personnel can access the data, but unauthorized personnel cannot access the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

Encryption scrambles data to make it unreadable by unauthorized personnel. Authorized personnel can decrypt the data to access it,

a strong technical control used to protect the confidentiality of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(PII)

A

Personally Identifiable Information such as medical information or credit card data via email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Controls

A

Identification, authentication, and authorization combined provide access controls and help ensure authorized personnel can access the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identification.

A

Users claim an identity with a unique username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication.

A

Users prove their identity with authentication, such as with a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization.

A

grant or restrict access to resources using an authorization method, such as permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Obfuscation

A

attempt to make something unclear or difficult to understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

only tells you that the message has been modified.

verify that integrity is maintained when files are downloaded or transferred.

hash is simply a number created with a hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fault Tolerance

A

a system with fault tolerance can suffer a fault, but it can tolerate it and continue to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

single point of failure (SPOF).

A

its failure takes down the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disk redundancies.

A

RAID-1 (mirroring), RAID-5 (striping with parity), and RAID-10 (striping with a mirror), allow a system to continue to operate even if a disk fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server redundancies.

A

In a failover cluster, the service switches from the failed server in a cluster to an operational server in the same cluster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Load balancing.

A

uses multiple servers to support a single service, such as a high-volume web site. It can increase the availability of web sites and web-based applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Site redundancies.

A

If a site can no longer function due to a disaster, the organization can move critical systems to an alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Backups.

A

personnel back up important data, they can restore it if the original data is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Alternate power.

A

Uninterruptible power supplies (UPSs) and power generators can provide power to key systems even if commercial power fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cooling systems.

A

Heating, ventilation, and air conditioning (HVAC) systems improve the availability of systems by reducing outages from overheating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Patching

A

When software vendors discover the bugs, they develop and release code that patches or resolves these problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Risk

A

the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

threat

A

is any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
security incident
can negatively affect the confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data.
26
Risk mitigation
reduces the chances that a threat will exploit a vulnerability.
27
Technical controls
use technology to reduce vulnerabilities.
28
Antivirus software.
provides protection against malware infection.
29
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs).
can monitor a network or host for intrusions and provide ongoing protection against various threats.
30
Firewalls.
firewalls restrict network traffic going in and out of a network.
31
Least privilege.
individuals or processes are granted only the privileges they need to perform their assigned tasks or functions, but no more.
32
Administrative controls
mandated by organizational policies or other guidelines.
33
Risk assessments.
help quantify and qualify risks within an organization so that the organization can focus on the serious risks.
34
Vulnerability assessments.
attempts to discover current vulnerabilities or weaknesses.
35
Penetration tests.
exploit vulnerabilities.
36
Configuration and change management.
Configuration management often uses baselines to ensure that systems start in a secure, hardened state. Change management helps ensure that changes don’t result in unintended configuration errors.
37
Contingency planning.
help an organization plan and prepare for potential system outages. The goal is to reduce the overall impact on the organization if an outage occurs.
38
Media protection.
Media includes physical media such as USB flash drives, external and internal drives, and backup tapes.
39
Physical and environmental protection.
This includes physical controls, such as cameras and door locks, and environmental controls, such as heating and ventilation systems.
40
Physical controls
are any controls that you can physically touch. Some examples include lighting, signs, fences, security guards, and more.
41
Hardening.
making a system or application more secure than its default configuration. This uses a defense-in-depth strategy with layered security. This includes disabling unnecessary ports and services, implementing secure protocols, using strong passwords along with a robust password policy, and disabling default and unnecessary accounts.
42
Security awareness and training.
Ensuring that users are aware of security vulnerabilities and threats helps prevent incidents.
43
Security guards.
Guards prevent and deter many attacks. For example, guards can prevent unauthorized access into secure areas of a building by first verifying user identities.
44
Change management.
Change management ensures that changes don’t result in unintended outages. In other words, instead of administrators making changes on the fly, they submit the change to a change management process.
45
Account disablement policy.
An account disablement policy ensures that user accounts are disabled when an employee leaves.
46
Detective controls
attempt to detect when vulnerabilities have been exploited,
47
Log monitoring.
Several different logs record details of activity on systems and networks. For example, firewall logs record details of all traffic that the firewall blocked.
48
Trend analysis.
analyzing past alerts, you can identify trends, such as an increase of attacks on a specific system.
49
Security audit.
Security audits can examine the security posture of an organization.
50
IPS.
intrusion prevention system (IPS) attempts to detect attacks and then modify the environment to block the attack from continuing.
51
Deterrent controls
attempt to discourage a threat. Some deterrent controls attempt to discourage potential attackers from attacking, and others attempt to discourage employees from violating a security policy.
52
Compensating controls
are alternative controls used instead of a primary control.
53
Virtualization
allows you to host one or more virtual systems, or virtual machines (VMs), on a single physical system. allows multiple virtual servers to operate on a single physical server. It provides increased availability with lower operating costs.
54
Hypervisor.
The software that creates, runs, and manages the VMs
55
Host.
physical system hosting the VMs is the host. It requires more resources than a typical system, such as multiple processors, massive amounts of RAM, fast and abundant hard drive space, and one or more fast network cards.
56
Guest.
Operating systems running on the host system are guests or guest machines.
57
Host elasticity and scalability.
Elasticity and scalability refer to the ability to resize computing capacity based on the load.
58
Type I. Type I hypervisors
run directly on the system hardware. They are often called bare-metal hypervisors because they don’t need to run within an operating system.
59
Type II. Type II hypervisors
run as software within a host operating system. For example, the Microsoft Hyper-V hypervisor runs within a Microsoft operating system.
60
VM escape
attack that allows an attacker to access the host system from within the virtual system.
61
VM sprawl
occurs when an organization has many VMs that aren’t managed properly.
62
launch the Windows Command Prompt window.
right- click the Start button and select Command Prompt,
63
Ping
basic command used to test connectivity for remote systems. You can also use it to verify a system can resolve valid host names to IP addresses, test the NIC, and check the security posture of a network.
64
Ipconfig,(windows) | Internet Protocol configuration
shows the Transmission Control Protocol/Internet Protocol (TCP/IP) configuration information for a system. This includes items such as the computer’s IP address, subnet mask, default gateway, MAC address, and the address of a Domain Name System (DNS) server. first step when troubleshooting network problems.
65
ifconfig (Linux) interface configuration)
has more capabilities than ipconfig, allowing you to use it to configure the NIC in addition to listing the properties of the NIC.
66
Entering ipconfig.
provides basic information about the NIC, such as the IP address, subnet mask, and default gateway.
67
Entering ipconfig /all.
command shows a comprehensive listing of TCP/IP configuration information for each NIC. It includes the media access control (MAC) address, the address of assigned DNS servers, and the address of a Dynamic Host Configuration Protocol (DHCP) server if the system is a DHCP client. You can use ifconfig -a on Linux systems.
68
Entering ipconfig /displaydns.
it stores the result in the DNS cache and this command shows the contents of the DNS cache. It also shows any host name to IP address mappings included in the hosts file.
69
Entering ipconfig /flushdns.
You can erase the contents of the DNS cache with this command.
70
netstat network statistics)
allows you to view statistics for TCP/IP protocols on a system. It also gives you the ability to view active TCP/IP network connections.
71
tracert
identify faulty routers on the network. lists the routers between two systems.
72
Arp
view and manipulate the ARP cache.
73
Steganography
(hiding data inside other data)