Domain 9 - Exam Feedback Flashcards
(489 cards)
What are the elements of the Process for Attack Simulation and Threat Analysis (PASTA), a seven-step threat modeling methodology?
The seven steps of PASTA are:
- Definition the Objectives (DO) for the Analysis of Risks,
- Definition of the Technical Scope (DTS),
- Application Decomposition and Analysis (ADA),
- Threat Analysis (TA),
- Weakness and Vulnerability Analysis (WVA),
- Attack Modeling and Simulation (AMS), and
- Risk Analysis and Management (RAM).
Note – Containment and Eradication (CE) is not a step of PASTA. Instead, these are two elements of a typical incident response policy.
UDP is a connectionless protocol that operates at the Transport layer of the OSI model and uses ports to manage simultaneous connections. Which of the following terms also is related to UDP?
Simplex
UDP is a simplex protocol at the Transport layer.
What is the client source port of a secured web communication?
Note – IT is NOT port 443!
A dynamic port
Client source ports are dynamic ports (i.e., randomly selected port number between 1024–65,535) for most Application layer protocols, including secure web communications (i.e., HTTPS).
What’s the difference between a Type I and Type II Hypervisor?
A Type I hypervisor is a native or bare-metal hypervisor. In this configuration, there is no host OS; instead, the hypervisor installs directly onto the hardware where the host OS would normally reside. Type 1 hypervisors are often used to support server virtualization.
A Type II hypervisor is a hosted hypervisor. In this configuration, a standard regular OS is present on the hardware, and then the hypervisor is installed as another software application. Type II hypervisors are often used in relation to desktop deployments, where the guest OSs offer safe sandbox areas to test new code, allow the execution of legacy applications, support apps from alternate OSs, and provide the user with access to the capabilities of a host OS.
In object-oriented programming, what term describes a collection of the common methods from a set of objects that defines the behavior of those objects?
A class is a collection of the common methods from a set of objects that defines the behavior of those objects.
Is it a good idea to power down a compromised system in the detection phase of an incident response?
NO
You should never power down a compromised system during the early stages of incident response because this may destroy valuable evidence stored in volatile memory. The other answers include steps that will isolate a system without destroying evidence in typical scenarios.
What is a primary goal within the detection phase of incident response?
Identification of incidents
A primary goal within the detection phase of incident response is identification of an incident. Restoration of normal activity occurs during the recovery phase. Lessons learned is the final phase of incident response.
What is an access control list (ACL) based on? Subject or Object?
Object
An ACL is based on an object and includes a list of subjects that are granted access. A capability table is focused on a subject and includes a list of objects the subject can access. Roles and accounts are examples of subjects and may be included in an ACL, but they aren’t the focus.
What is the weakest method of authentication?
Strong static passwords
Strong passwords are the weakest form of authentication from the given answers. One-time passwords are stronger than static passwords. Biometric methods such as retina scans are stronger than passwords.
Which security protocol automatically performs reauthentication of the client system throughout the connected session in order to detect session hijacking?
CHAP
CHAP is a security protocol that automatically performs reauthentication of the client system throughout the connected session in order to detect session hijacking.
What term describes the processor mode used to run the system tools used by administrators seeking to make configuration changes to a machine?
User Mode or Supervisory Mode?
User Mode
All user applications, regardless of the security permissions assigned to the user, execute in user mode. Supervisory mode, kernel mode, and privileged mode are all terms that describe the mode used by the processor to execute instructions that originate from the operating system.
What law amended the Health Insurance Portability and Accountability Act to include data breach notification requirements?
HITECH
The Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) amended HIPAA to include new regulations related to data breach notification and the compliance requirements of covered entity business associates.
What regulation formalizes the prudent man rule that requires senior executives to take personal responsibility for their actions?
Federal Sentencing Guidelines
Which of the following provides the best protection against mishandling media that contains sensitive information?
Marking
Purging
Sanitizing
Retaining?
Marking
Marking (or labeling) media is the best choice of the available answers to protect against mishandling media. When properly marked, personnel are more likely to handle media properly. Purging and sanitizing methods remove sensitive information but do not protect against mishandling. Data retention refers to how long an organization keeps the data, not how it handles the data.
Which one of the following individuals is most likely to cause serious intentional damage to a business’s computing resources?
Malicious insider or Terrorist?
malicious insider
The malicious insider poses the greatest risk to your organization because they might already have access to your systems and a working knowledge of your infrastructure.
Which federal government agency is responsible for ensuring the security of government computer systems that are used to process sensitive and/or classified information?
National Security Agency
The National Security Agency is responsible for managing the security of computer systems that process sensitive and/or classified information. The security of all other federal government systems is entrusted to the National Institute of Standards and Technology.
Once a system is compromised, _______________ is deployed to restore it to its previous known-good state.
Corrective access control
Corrective access control is deployed to restore systems to normal after an unwanted or unauthorized activity has occurred.
What is the biggest problem with computer-based information when used as evidence?
The biggest problem with computer evidence is that some of it may be volatile, meaning it can be lost with the loss of power. Finding and preserving volatile evidence from memory is the most challenging aspect of gathering computer evidence. Although computer evidence is usually considered hearsay, there is an exception to the hearsay rule that makes it admissible (specifically if it was created by a normal business operation and supported by a witness).
_______________ is the process by which a subject provides a username, logon ID, personal identification number, and so on.
Identification, not Authentication
Identification is the process by which a subject professes an identity and accountability is initiated.
Flo and Ricky are sending messages to each other using an asymmetric encryption algorithm. Flo wants to send Ricky a private message. What key should she use to encrypt it?
Ricky’s public key
What is split-DNS?
Dividing internal DNS from external DNS
Which type of control provides extended options to existing controls and aids or supports administrative security policy?
Compensation access control
Compensation access control is deployed to provide various options to existing controls to help enforce and support a security policy.
Subjects can be held accountable for their actions toward other subjects and objects while they are authenticated to a system. What process facilitates this accountability?
Monitoring
Monitoring the activities of subjects and objects, as well as of core system functions that maintain the operating environment and the security mechanisms, helps establish accountability on the system.
What is a directive control?
A directive control is a security tool used to guide the security implementation of an organization.



