CyberS C6 Flashcards

1
Q

Q81: What is the concept of high availability?

A

A81: High availability refers to a system or component that is continuously operational for a given length of time, aiming for systems and services to be available 99.999% of the time with less than 5.26 minutes of downtime per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q82: What does “Five Nines” mean in terms of availability?

A

A82: “Five Nines” means that systems and services are available 99.999% of the time, implying both planned and unplanned downtime is less than 5.26 minutes per year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q83: What are the key strategies to ensure high availability?

A

A83: To ensure high availability, it’s essential to:
1. Eliminate single points of failure.
2. Design for reliability.
3. Detect failures as they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q84: How do high availability measures improve availability?

A

A84: High availability measures improve availability by ensuring systems and services are continuously operational, reducing downtime, and increasing reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q85: How does an incident response plan improve high availability?

A

A85: An incident response plan improves high availability by providing a structured approach to detect, respond to, and recover from security incidents, minimizing their impact on system availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q86: What role does disaster recovery planning play in implementing high availability?

A

A86: Disaster recovery planning plays an important role in implementing high availability by preparing organizations to recover from significant incidents or disasters, ensuring business continuity and minimizing downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q87: Which industries require high availability due to continuous trading, compliance, and customer trust?

A

A87: The finance industry requires high availability due to continuous trading, compliance, and customer trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q88: Why do healthcare facilities require high availability?

A

A88: Healthcare facilities require high availability to provide around-the-clock care for patients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q89: Which industry includes agencies providing security and services to a community, state, or nation?

A

A89: The public safety industry includes agencies that provide security and services to a community, state, or nation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q90: Why does the retail industry require high availability?

A

A90: The retail industry depends on efficient supply chains and the timely delivery of products to customers, especially during peak demand times such as holidays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q91: What are some threats to high availability?

A

A91: Threats to high availability can range from failures of mission-critical applications to severe weather events like hurricanes or tornadoes. They can also include catastrophic events such as terrorist attacks, building bombings, or fires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q92: What are the three major principles incorporated into designing a high availability system?

A

A92: The three major principles incorporated into designing a high availability system are:
1. Elimination or reduction of single-points of failure.
2. System Resiliency.
3. Fault Tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q93: Why is asset management important for improving availability?

A

A93: Asset management is important for improving availability because an organization needs to know its hardware and software assets to protect them effectively. This includes knowing all components subject to security risks, such as hardware systems, operating systems, network devices, software applications, firmware, language runtime environments, individual libraries, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q94: What does asset classification involve?

A

A94: Asset classification involves assigning all resources of an organization into a group based on common characteristics. This classification system can be applied to documents, data records, data files, and disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q95: What is asset standardization in the context of IT asset management?

A

A95: Asset standardization in the context of IT asset management specifies the acceptable IT assets that meet an organization’s objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q96: What is the purpose of the Common Vulnerabilities and Exposures (CVE) identification?

A

A96: The Common Vulnerabilities and Exposures (CVE) identification, sponsored by the United States Computer Emergency Readiness Team (US-CERT) and the U.S. Department of Homeland Security, provides a standard identifier number with a brief description and references to related vulnerability reports and advisories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q97: What is risk analysis in the context of availability?

A

A97: Risk analysis is the process of analyzing the dangers posed by natural and human-caused events to an organization’s assets. It helps in determining which assets need protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q98: What does mitigation involve in the context of improving availability?

A

A98: Mitigation involves reducing the severity or likelihood of loss from occurring. Various technical controls, such as authentication systems, file permissions, and firewalls, can help mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q99: What is Defense in Depth in the context of improving availability?

A

A99: Defense in Depth is a layered approach to cybersecurity that provides comprehensive protection by creating multiple barriers. If cyber criminals breach one layer, they must navigate through several more, with each layer being more complex than the previous one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q100: How does limiting access to data improve availability?

A

A100: Limiting access to data reduces the possibility of threats. Organizations should restrict access so that users only have access levels necessary for their job roles, minimizing the risk of unauthorized access.

21
Q

Q101: What does diversity refer to in the context of Defense in Depth?

A

A101: Diversity in Defense in Depth refers to changing controls and procedures across different layers. Breaching one layer does not compromise the entire system, as different encryption algorithms or authentication systems may be used at different layers.

Diversity in Defense in Depth involves implementing diverse controls and procedures across multiple layers of defense. This ensures that breaching one layer doesn’t compromise the entire system, as different encryption algorithms or authentication methods are employed at each layer.

22
Q

Q102: How can obscuring information protect data and information?

A

A102: Obscuring information involves not revealing details that cyber criminals can exploit. This includes concealing information about the operating system version, server type, or equipment used, making it harder for attackers to identify vulnerabilities.

23
Q

Q103: Does complexity guarantee security in Defense in Depth?

A

A103: No, complexity does not necessarily guarantee security. Overly complex processes or technologies can lead to misconfigurations or non-compliance, potentially compromising security. Sometimes, simplicity can improve availability.

24
Q

Q104: What is a single point of failure, and why is it problematic?

A

A104: A single point of failure is a specific component, process, piece of data, or utility that, if it fails, can disrupt an organization’s operations. It’s problematic because it can compromise the availability of the entire system.

25
Q

Q105: How can redundancy improve availability?

A

A105: Redundancy involves building backup components into critical operations to ensure system availability. In the event of a component failure, the backup component takes over, ensuring uninterrupted service.

26
Q

Q106: What does N+1 redundancy mean?

A

A106: N+1 redundancy ensures system availability by having at least one backup component for every critical component (N). For example, a car has four tires (N) and a spare tire in the trunk (+1) for use in case of a flat tire.

27
Q

Q107: What is RAID?

A

A107: RAID (Redundant Array of Independent Disks) combines multiple physical hard drives into a single logical unit to provide data redundancy and improve performance. It spreads data across several drives, allowing data recovery if any single disk fails.

28
Q

Q108: How does RAID improve data recovery speed?

A

A108: RAID increases data recovery speed by using multiple drives. Retrieving requested data becomes faster as the workload is distributed across several disks instead of relying on a single disk.

29
Q

Q109: What are the two types of RAID solutions, and what do they mean?

A

A109: RAID solutions can be hardware-based or software-based. Terms describing RAID storage methods include:
- Parity: Detects data errors.
- Striping: Writes data across multiple drives.
- Mirroring: Stores duplicate data on a second drive.

30
Q

Q110: What is Spanning Tree Protocol (STP) in the context of network redundancy?

A

A110: Spanning Tree Protocol (STP) is a network protocol that prevents loops in a network when switches interconnect via multiple paths. It ensures that redundant physical links are loop-free and blocks redundant paths that could cause loops.

31
Q

Q111: Why is having a single router as a default gateway problematic?

A

A111: Having a single router as a default gateway is problematic because it becomes a single point of failure. If the router fails, devices lose access to the rest of the network or the Internet.

32
Q

Q112: What is first-hop redundancy in the context of router redundancy?

A

A112: First-hop redundancy refers to the ability of a network to dynamically recover from the failure of a router acting as a default gateway by switching to an alternative router.

33
Q

Q113: What is Hot Standby Router Protocol (HSRP)?

A

A113: Hot Standby Router Protocol (HSRP) provides high network availability by offering first-hop routing redundancy. It allows a backup router to take over if the primary router fails.

34
Q

Q114: What is Virtual Router Redundancy Protocol (VRRP)?

A

A114: Virtual Router Redundancy Protocol (VRRP) allows one or more routers attached to a LAN to work together. In a VRRP configuration, one router is elected as the virtual router master, and others act as backups in case the master fails.

35
Q

Q115: What is Gateway Load Balancing Protocol (GLBP)?

A

A115: Gateway Load Balancing Protocol (GLBP) provides data traffic protection from a failed router or circuit. Like HSRP and VRRP, it allows load balancing between a group of redundant routers, distributing traffic and preventing overloads.

36
Q

Q116: What are the three forms of location redundancy?

A

A116: The three forms of location redundancy are:
- Synchronous: Synchronizes both locations in real time, requires high bandwidth, and the locations must be close together to reduce latency.
- Asynchronous Replication: Not synchronized in real time but close to it, requires less bandwidth, and sites can be further apart because latency is less of an issue.
- Point-in-time Replication: Updates the backup data location periodically and is the most bandwidth conservative option because it does not require a constant connection.

37
Q

Q117: What is system resilience in the context of improving availability?

A

A117: System resilience defines the methods and configurations used to make a system or network tolerant of failure. It involves understanding the business needs of the organization and incorporating redundancy to create a resilient network, going beyond just adding redundancy.

38
Q

Q118: What are the four phases of incident response?

A

A118: The four phases of incident response are:
1. Preparation: Planning for potential incidents.
2. Detection and Analysis: Discovering the incident.
3. Containment and Eradication, and Recovery: Efforts to immediately contain or eradicate the threat and begin recovery efforts.
4. Post-Incident Follow-Up: Investigate the cause of the incident and ask questions to better understand the nature of the threat.

39
Q

Q119: What is Network Admission Control (NAC) used for?

A

A119: Network Admission Control (NAC) allows network access for authorized users with compliant systems. A compliant system meets all the policy requirements of the organization.

40
Q

Q120: What do Intrusion Detection Systems (IDSs) do?

A

A120: Intrusion Detection Systems (IDSs) monitor the traffic on a network. They are passive systems that detect and alert on suspicious activities but do not take direct action.

41
Q

Q121: How do Intrusion Prevention Systems differ from IDSs?

A

A121: Intrusion Prevention Systems operate in inline mode, allowing them to detect and immediately address a network problem by taking direct action against suspicious activities.

42
Q

Q122: What is NetFlow and IPFIX?

A

A122: NetFlow is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch. The Internet Engineering Task Force (IETF) used Cisco’s NetFlow Version 9 as the basis for IP Flow Information Export (IPFIX).

43
Q

Q123: How can Advanced Threat Intelligence help organizations?

A

A123: Advanced Threat Intelligence can help organizations detect attacks during one of the stages of the cyberattack and sometimes even before by providing the right information.

44
Q

Q124: What is considered a disaster in disaster recovery planning?

A

A124: A disaster includes any natural or human-caused event that damages assets or property and impairs the ability for the organization to continue operating.

45
Q

Q125: What are the types of natural disasters mentioned in disaster recovery planning?

A

A125: Natural disasters include:
- Geological disasters: earthquakes, landslides, volcanoes, and tsunamis
- Meteorological disasters: hurricanes, tornadoes, snow storms, lightning, and hail
- Health disasters: widespread illnesses, quarantines, and pandemics
- Miscellaneous disasters: fires, floods, solar storms, and avalanches

46
Q

Q126: What are the types of human-caused disasters mentioned in disaster recovery planning?

A

A126: Human-caused disasters include:
- Labor events: strikes, walkouts, and slowdowns
- Social-political events: vandalism, blockades, protests, sabotage, terrorism, and war
- Materials events: hazardous spills and fires
- Utilities disruptions: power failures, communication outages, fuel shortages, and radioactive fallout

47
Q

Q127: What is the need for business continuity planning?

A

A127: Business continuity planning ensures the organization’s ability to continue its operations regardless of any unforeseen events or disasters. It helps in maintaining business functions during and after a disaster.

48
Q

Q128: What are some considerations for business continuity planning?

A

A128: Business continuity considerations should include:
- Documenting configurations
- Establishing alternate communications channels
- Providing power
- Identifying all dependencies for applications and processes
- Understanding how to carry out automated tasks manually

49
Q

Q129: What are the best practices for business continuity planning?

A

A129: The best practices for business continuity planning include:
1. Writing a policy that provides guidance for developing the business continuity plan and assigning roles.
2. Identifying critical systems and processes and prioritizing them.
3. Identifying vulnerabilities, threats, and calculating risks.
4. Identifying and implementing controls and countermeasures to reduce risk.
5. Devising methods to bring back critical systems quickly.
6. Writing procedures to keep the organization functioning during chaotic states.
7. Testing the plan.
8. Updating the plan regularly.