CISSP Domain 7 Flashcards

1
Q

Security Operations

A
Operations department responsibility
Administrative management responsibilities
Assurance levels
Configuration management
Physical security
Secure resource provisioning
Network and resource provisioning
Preventive measures
Patch management
Incident management
Recovery strategies
Disaster recovery
Business continuity planning and exercises
Liability
Investigations
Personal safety concerns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Operations pertains to

A

everything that takes place to keep networks, computer systems, applications, and environments up and running in a secure and protected manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Operations also involves

A

detection, containment, eradication, and recovery required to ensure continuity of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Role of Operations Department

A

Continual effort to make sure the correct policies, procedures, standards, and guidelines are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Separation of duties

A

helps prevent mistakes and minimize conflicts of interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Job rotation

A

over time, more than one person fulfills the task of one position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mandatory Vacations

A

an Administrative control

detect fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Initial Program Load

A

Mainframe term for loading an OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration Management

A

process of establishing and maintaining effective system controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Input and Output controls

A

Data entered should be the correct format
Transactions should be atomic
Must be timestamped and logged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bastion Hosts

A

Locked down at entry of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 main types of mechanical locks

A

Warded is basic padlock. Spring loaded bolt with a notch cut in it. Key fits the notch and slides the bolt from locked to unlocked position These are the cheapest

Tumbler has more pieces and parts than a ward lock. Key fits a cylinder pins are raised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 types of tumbler locks

A

pin tumbler most common tumbler lock. key has just the right grooves to put all spring loaded pins in the right position

wafer tumbler also called disk tumbler are small, round locks as on file cabinets Uses wafers, or flat disks instead of pins
lever tumbler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cipher locks

A

programmable locks are keyless and use keypads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fences

A

3 to 4 feet only deter casual trespassers
6 to 7 feet are too high to climb easily
8 foot deter more determined criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PIDAS fencing

A

Perimeter Intrusion Detection and Assessment System

Type of fencing with sensors on the wire mesh of the fence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Gate classifications

A

Class 1 Residential
Class 2 Commercial
Class 3 Industrial
Class 4 Restricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bollards

A

Concrete pillars outside a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Mean Time Between Failures

A

How long is a piece of equipment expected to last.

Calculated by average time between failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mean Time to Fail MTTF

A

Life expectancy of a product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mean Time To Repair MTTR

A

amount of time to fix a failure and return to production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Single Points of Failure

A

Firewalls, routers, network servers T1 lines, Hubs, switches, authentication servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RAID

A

Redundant array of Independent Disks

Redundancy and Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Direct Access Storage Device

A

General Term for magnetic disk storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Massive Array of Inactive Disks
Carries out mostly write operations
26
Redundant Array of Independent Tapes
Striped over multiple tape drives
27
Rainbow Tables
All possible passwords in hashed formats
28
Hierarchical Storage Management
Continuous backup functionality Dynamically manages storage and backup of files Faster media holds files used more often. Seldom used files are stored on slower devices
29
Trivial File Transfer Protocol
Used to save configuration of network devices. | Is insecure
30
Preventive Measures
``` Understand the Risk Use the right controls Use controls correctly Manage your configuration Assess your operation ```
31
IPS IDS False Positive
detecting intrusions that are not intrusions
32
IPS IDS False negatives
system incorrectly classifies as being Benign
33
Baselining
Process of establishing normal patterns of behavior
34
Patches are
software updates intended to remove a vulnerability or defect in software or provide new features or functionality.
35
Sandboxing
isolates executing code from the operating systems
36
Honeypots
device developed in order to deceive attackers into believing it is a real production system
37
Honeynet
An entire network that is meant to be compromised
38
7 phases of Incident Management
``` Detect Respond mitigate Report Recover Remediate Learn ```
39
Event is
any occurrence that can be observed, verified, and documented
40
Incident is
one or more related events that negatively affect the company and/or impact its security posture
41
Cyber Kill Chain
1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. Installation 6 Command and control 7 Actions on the Objective
42
Detection
Realize you have a problem
43
Response
Determine appropriate action after detection
44
Mitigation
after Detection and Response What happened and what will happen next Prevent or reduce further damage
45
Reporting
After Detection, Response, and Mitigation ``` Summary Indicators Related Incidents Action Taken Chain of Custody Impact Assessment Identity and comments of incident handlers Next steps to be taken ```
46
Recovery
After Detection, Response, Mitigation, and Reporting Return all systems to a known good state Gather evidence before recovery
47
Remediation
After Detection, Response, Mitigation, Reporting and Recovery Ensure the attack is never successful again
48
Learning
What happened What dd we learn How can we do it better next time Postmortem Analysis
49
Recovery Time Objective
maximum time period within which a business process must be restored to a designated service level after a disaster Should be smaller than the MTD value
50
Work Recovery Time WRT
remainder of MTD value after the RTO has passed
51
Recovery Point Objective
is the acceptable a Amount of data loss measured in time
52
Hot site
facility that is leased or rented and is fully configured to operate withing a few hours Equipment and software must be completely compatible Must not cause any negative interoperability issues. Most expensive of the three types of offsite facilities
53
Warm Site
Leased or rented facility that is usually partially configured with some equipment, such as HVAC, and foundational infrastructure components, but not he actual computers Equipment may need to be procured, delivered, and configured.
54
Cold Site
Leased or rented facility that supplies basic environment, electrical, wiring, air conditioning, plumbing and flooring Is an empty data center.
55
Service Bureau
a company that has additional space and capacity to provide applications and services such as a call center.
56
Tertiary Site
a secondary backup site
57
Reciprocal agreement
with another company to host infrastructure
58
Redundant sites
mirrored sites two sites completely synchronized ICS2 differentiates between a hot leased site and a redundant company owned site
59
Rolling Hot Site
Large truck is turned into a data processing or work area
60
Backups can be
Full, differential, incremental, or a combo
61
Archive bit
file systems keep track of what files have been modified by setting an archive bit. If a file is modified or created, the file system sets the archive bit to 1
62
Full backup
During a full backup the archive bit is cleared Most companies do a full backup with a differential or incremental backup
63
Differential backup
backs up files that have been modified since the last full backup When restored, the full backup is done first, then differential is put on top of it. Differential does not change the archive bit
64
Incremental backup
all files modified since last full or incremental backup. Archive bit is cleared. To restore and incremental backup, restore the full then every incremental backup
65
Disk shadowing
similar to disk mirroring Fault tolerant solution by duplicating hardware and maintaining more than one copy of information
66
Disk duplexing
more than one disk controller If on disk controller fails, the other is ready and available
67
Electronic vaulting
makes copies of files as they are modified and periodically transmits them to an offsite backup site Carried out in batches rather than real time Method of transferring bulk information to offsite facilities
68
Remote Journaling
method of transmitting data offsite but only includes moving journal or transaction logs to the offsite facility Actual files are not moved Remote is real time Remote vaulting is in batches
69
High Availability
combination of technologies and processes that work together to ensure some specific thing is always up and running