Chapter 1 Security Fundamentals Flashcards

1
Q

What are the three components of the CIA triad?

A

The three components of the CIA triad are confidentiality (where the data is encrypted), integrity (where the data uses hashing), and availability (where the data is available, for example, by restoring data from a backup).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why might an inactive CCTV camera be placed on the outside wall of a building?

A

An inactive CCTV camera could be used as a deterrent since criminals would not know that it is inactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean?

A

Confidentiality means preventing other people from viewing the data; the best way to keep data confidential is to encrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you control access of personnel to a data center?

A

The best way to control entry into a data center is to install a mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of an air gap?

A

The purpose of an air gap is to prevent data theft by removing physical connections between the device and network. The only way to insert or remove data from an air-gapped machine is with removable media like a USB drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three main control categories.

A

The three control categories are managerial, operational, and technical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three physical controls.

A

Any three of the following physical controls will apply: Lighting, cameras, robot sentries, fences, gate signage, industrial camouflage, security guards, badges, key management, proximity card, tokens, biometric locks, electronic locks, burglar alarms, smoke detectors, internal protection, conduits, HVAC, cable locks, airgap, laptop safe, USB data blocker, vault, and Faraday cage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Following an incident, what type of control will be used when researching how the incident happened?

A

Researching an incident requires detective controls wherein all the evidence is gathered and analyzed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you know whether the integrity of your data is intact?

A

Hashing provides data integrity where the hash value is measured before and after accessing data. If the values match, it has integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a corrective control?

A

Corrective controls are the actions you take to recover from an incident. You may have to restore data from a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of control is it when you change the firewall rules?

A

Firewall rules are designed to mitigate risk. They are technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is used to log in to a system that works in conjunction with a PIN?

A

A smart card, a CAC card, or a PIV card are all used in conjunction with a PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the person who looks after classified data? Who gives people access to the classified data?

A

In a MAC model, the custodian stores and manages the data. The administrator grants access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you use a DAC model for access, who determines who gains access to the data?

A

In a DAC environment, the data owner decides who has access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is least privilege?

A

Least privilege is the process of giving an employee minimal permissions to perform their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What access is granted by the Linux file permission of 764?

A

The Linux permission of 764 gives the owner read, write, and execute access, the group read and write access, and other (users) read access.

17
Q

The sales team is allowed to log in to the company system between 9 a.m. and 10
p.m. What type of access control is being used?

A

This is called rule-based access control. The access is applied to the whole department

18
Q

Two people from the finance team are only allowed to authorize the payment of checks. What type of access control are they using?

A

The two people from finance are using role-based access control where a subset of a department is carrying out a subset of duties

19
Q

What is the purpose of the defense in-depth model?

A

The defense-in-depth model has multiple layers, the purpose of which is to protect data and resources. If the outer layer fails, then the next layer should perform the protection. Many layers need to be broken through before gaining access to the data or resource

20
Q

When someone leaves the company, what is the first thing you should do with their user account?

A

When someone leaves the company, you should disable the account and reset the password so that it cannot be used.

21
Q

What do US companies that host websites in the US have to comply with if customers are based in Poland?

A

The EU GDPR states that if a website that is hosted by someone in the US is accessed by someone from within the EU (which includes Poland), that website needs to be GDPR-compliant.

22
Q

How can a company discover that its suppliers are using inferior products?

A

If a company puts a right to audit clause into a contract, it gives them the right to audit the supplier at any time. This way, the company can look at the company records and check the quality of the products and materials being used.

23
Q

What is one of the most important factors between someone being arrested and their appearance before the judge in court?

A

Chain of custody is a record of who has collected the evidence and provides a log of who has handled the data. The original data must be intact, and there must not be any break in the chain.

24
Q

Can you explain what the purpose of the CLOUD Act and COPOA is?

A

The US released The CLOUD Act so that they could obtain evidence from other countries for an FBI investigation. The UK government released the COPOA act to seek data stored overseas and give their law enforcement faster access to evidence held by providers

25
Q

What is Stage C of Cloud Forensic Process 26?

A

In Stage C of Cloud Forensic Process 26, you ascertain the type of technology behind the cloud.