Domain 1 Flashcards

(43 cards)

1
Q

CIA - Authorization - Attacks

A

Confidentiality - MAC - Social Engineering
Integrity - RBAC - HASH
Availability - DAC - DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAAA

A

Id
Authentication - something ur, know, have
Authorization - DAC, MAC, RBAC, ABAC
Accounting - Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Content base AC vs Context

A

Access content based on rights
Access based on parameters/ conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Qualitative risk vs quantitative

A

How likely it is to happen
How much it’ll cost if it happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DAC, MAC, RBAC, ABAC

A

Access based on given rights by owner
Confidentiality like military
Access based on role given and assigned job
Policy engine gives access based on conditions and role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control category

A

Admin (directive) - policy
Tech (logic) - hardware/ software
Physical - locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Types

A

CC PDD
corrective, compensating, preventive, detective, deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Cyle

A

ID risk > risk assessment (Q2) > risk response (second, transfer, avoidance, Do not Reject risk) > Contro/monitoring ( KGI, KPI, KRI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk = threat X vulnerability

A

Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Criminal, Civil, ECPA, CFAA, PC-DSS

A

Punish/ deter society, individuals/ group, protect against wire tapping, law to prosecute crime, credit card standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security governance principle
Vision, mission, strategic objectives, Action, guidelines

A

Hope, motivation, plans/goals, resource, recommendation (non mandatory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BCP, COOP, crisis communication plan, OEP, BRP

A

process of creating long term strategic planning and procedure after disaster.
How we operate during a disaster.
Person speaks to press.
How we protect facility and staff in disaster.
List of steps needed to recover back to normal business from disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CMP

A

Coordination w management in an emergency, steps to ensure safety of personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DRP cycle

A

Disaster recovery plan
Mitigation ( pre disaster mitigation), preparation (educ), response ( emergency plan), recovery ( post disaster recovery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DRP Simulated test - Review, read through, walk through, simulation

A

Team looks at gaps
Manager goes through recovery process
Tabletop
The whole team does scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DRP physical test - partial interruption, response, recovery

A

Off hours
How we react
Re establish recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BIA, RPO, MTTR, MOR, MTBF

A

Id critical and non critical system
Acceptable data we can loose
how long it’ll take to recover
Minimum requirements to operate
How long new component will fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Incident management (event)

A

Monitor/ detection of security event and react to them
Event > alert > incident > problem > inconvenience > emergency > disaster > catastrophe

19
Q

Incident management life cycle

A

Prep (prepare for incident) > detect (analyze IPS) > response (team works on affected system) > mitigation (know the cause) > Report/recover/remediation > lessons learned

20
Q

Identify and access provisioning life cycle

A

Policy defines a persons credential access NO activity FOR 30 days

21
Q

Federated ID, FIDM, SSO

A

Persons electronic ID across systems
Policy to manage ID of user across org USAF
CAC - single sign on for multiple system

22
Q

Lights, CCTV, fence, TSA, Guard, Dog

A

Detect/deter
Deter/preventative
Preventative, detective, deterrent
Deterrence, detect, prevent, compensate
Deter, detect, compensate

23
Q

Separation of duties, Job rotation, Mandatory vacation

A

Need 2 people to do the task.
Detect error/ fraud like turnover, rotate jobs.
One person is not performing the same task

24
Q

Data classification

A

TS war plans - Confidential trade secrets (grave danger)
S deployment plans - Private PII (serious damage)
Confidential report - Sensitive system info (damage)

25
Circuit switching, packet switching, QoS
One dedicated circuit (Caro) Switches packets (cheap) Prioritizes specific data traffic like voip
26
LAN, MAN, WAN, GAN
Local like Campus KState Like Manhattan Manhattan to KC Global
27
IPV4 vs IPV6
32 bits 128 and IPSEC
28
ARP, ICMP
Has IP and ask network who has it to receive MAC address so they can communicate. Network analysis tool, ping, trace route
29
HTTP, HTTPS, DHCP ports, NAC
80 443 67 server 68 client assigns IP to client System adheres to security policy
30
STP, UTP
Extra shielded Un shielded wire
31
VLAN, VXLAN Layer
Layer 2 Physically shares switch but virtually separated Beyond switch can go to multiple locations
32
Router layer, static, default gate way, dynamic route, metric
Layer 3 IP and port connect LAN to WAN. Preconfigured route admin has to create. Sends non local traffic to ISP our exit to internet. Auto routing. Determines best route.
33
OSI layers
Please(bit) do(frame) not(packet) throw(segment) sausage pizza away (data)
34
TCP/IP
Link physical (1-2), network 3, transport 4, application (5,6,7)
35
SDN, SD-WAN, SDx
Control/manage network via software separate control and data plane. Connects multiple WAN in single point to use resource. Connects to everything
36
Stealth, polymorphic, multipart, macro
Hide from OS, changes signature definition, spreads in different vector, document/file
37
Signature, heuristic
Looks for signature (pattern) Behavior
38
HIPS, NIDS/NIPS
Can see unencrypted data on workstation. Can’t look at encrypted
39
IDS, IPS, attacks fragmentation, avoid default, low bandwidth
Sends alert Takes action Sends fragmented packet Attacker using unexpected port Did attackers using numerous ports
40
TP, TN, FP, FN
Attack/system acts Normal traffic/nothing Normal traffic/ system attacks Attack/ system doesn’t act
41
SOAR
SEIM W AI
42
Firewall layer, stateful filtering, attack, proxy
Layer 1-3. 1-4 if in routing table it’s good, need to connect with outside so they can communicate. DDoS to overwhelm table. Gateway from one net to another asking request from internet
43
NGFW, DMZ, stuxnet, hypervisor, type 1 and 2, attack on cloud
IDS/IPS antivirus w deep packet inspection. Segregated network between firewall. 3 modules worm>link>rootkit. Controls access bw guest and host hardware. Metal installed on top of hardware, everything runs on HV. Runs in computers OS. VM escape attacker jumps from host to client.