Chapter 11 - Security Operations Flashcards

(36 cards)

1
Q

Due Care vs Due Diligence

A

Due Care is keeping things maintained and due diligence is “look before you leap”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Accountability

A

Checking audit logs and enabling audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clipping Level

A

How many errors trigger an action or discipline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational Assurance

A

Ensure the product architecture and features are implemented securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Life-Cycle Assurance

A

Ensure design, testing and configuration management is in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What to look out for?

A

Unusual Occurrences
Deviation from Standard
Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IO Controls

A

Transactions should be timestamped and recorded
Input Validation
Output should only reach intended requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System Hardening

A

Lock that door, configure a password, SSL enable.. etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Licensing

A

Business Software Assurance (BSA) will get you if you dont license and pirate corporate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acceptable Use Policy

A

This is used to control what users can install and use on the technology the company provides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change Control

A

Used to document system changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sanitized data

A

Contents deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purging data

A

Contents deleted, and zeroization or degaussing occurs on the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Remanence

A

Residual data left over after sanitizing or purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Object Reuse

A

Giving a hard drive away to your grandma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MTBF

A

Mean time between failures is the estimated lifetime of equipment calculated by the vendor

17
Q

MTTR

A

Mean time to repair is how long a broken device takes to repair

18
Q

MAID

A

Massive array of inactive disks meant as a write mostly disk array

19
Q

RAIT

A

Redundant array of independent tape - the economical write mostly data array, which is to tape and set/forget

20
Q

Clustering vs Grid Compute

A

In Grid compute the nodes do not trust each other and work independently toward the common goal, cluster has cross talk between nodes, grid does not.

21
Q

Hierarchical storage management

A

Multitier backup storage, Disk, Tape, and Optical

22
Q

Mainframe

A

Differs from PC compute by having more processors in key places, like at the disk, network, and peripherals

23
Q

Supercomputer

A

Like a mainframe, but tuned and dialed in to parallelize a specific function (like an algorithm)

24
Q

Operators

A

Name used on the exam for mainframe operators

25
Facsimile Security
Fax encryption can be used to bulk encrypt fax server communication
26
OS fingerprinting
Tapping computers to find out the OS based of certain pattern responses.
27
Port knocking
Setup of two ports, one for service and one for opening the service in a session. Knock port should log verbosely.
28
LOKI
ICMP header communication
29
Mail Bombing
Overloading a mail system
30
Ping of Death
Oversized ICMP attack
31
Slamming and Cramming
Changing service providers without you knowing and inserting bogus charges
32
Vulnerability Guidelines
Must have management consent Personnel testing (social engineering) Physical testing (can I push the power button) System/Networking test (can I digitally get to it)
33
Penetration Testing
Actually attempting various attacks to uncover vulnerabilities
34
Get out of jail card
You need a document to protect you from prosecution and a contact to protect you. Contracts help.
35
What are the levels of knowledge assessment?
Zero, partial, and full knowledge assessments
36
Blind vs Double Blind
Blind - Public knowledge only | Double Blind - Security staff doesnt know either