Installation and Deployment Flashcards

1
Q

According to ITIL, the goal of configuration management is

A

To enable the control of the infrastructure by monitoring and maintaining information on all the resources that are necessary to deliver services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some of the necessary pre- and post-installation configuration management security considerations include:

A

Hardening; Environment Configuration; Release Management; Bootstrapping and Secure Startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening includes the processes of

A

Locking down a system to the most restrictive level so that it is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardening is effective in its

A

Defense against vulnerabilities that result from insecure, incorrect, or default system configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A MSB are set up to comply with

A

Minimum Security Baseline are set up to comply with the organizational security policies and help in
supporting the organization’s risk management efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardening of software involves

A

The setting the necessary and correct configuration settings and architecting the software to be secure by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some of the common examples of security misconfigurations include:

A

Hard coding credentials and cryptographic keys inline code or in configuration files in cleartext; Not disabling the listing of directories and files in a web server; Installation of software with default accounts and settings; Installation of the administrative console with default configuration settings; Installation or configuration of unneeded services, ports and
protocols, unused pages, and unprotected files and directories; Missing software patches; Lack of perimeter and host defensive controls such as firewalls, filters, etc; Enabling tracing and debugging can lead to attacks on confidentiality assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of software hardening (code centric) include:

A

Removal of maintenance hooks before deployment; Removal of debugging code and flags in code; Modifying the instrumentation of code to not contain any sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardening is a very important process in the which phase of software development

A

Hardening is a very important process in the installation phase of software development and proper attention must be given to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order for the software to function, it is granted administrative rights when installed. Which security principles are violated.

A

Least privilege (granted administrative rights); defense in depth (enabling disabled services, ports and protocols); separation of duties (when operations personnel allow developers access to production systems to install software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Additional configuration considerations include:

A

Test and default accounts need to be turned off; Unnecessary and unused services need to be removed in all environments; Access rights need to be denied by default and granted explicitly even in development and test environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Release management is the process of

A

ensuring that all changes that are made to the
computing environment are planned, documented, thoroughly tested and deployed with least privilege, without negatively impacting any existing business operations, customers, end-users or user support teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To manage software configuration management properly, one of the first things to do is to

A

To document and maintain the configuration information in a formal and structured manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The implementation, documentation, tests, project related documentation, tools including build tools are maintained in a configuration management system (CMS) required by stardard

A

ISO/IEC 15408 (Common Criteria)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Booting or bootstrapping

A

The sequences of events and processes that self-start the system to a preset state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Booting processes in general are also sometimes referred to as

A

The Initial Program Load (IPL).

17
Q

POST

A

Power-on self-test is the first step in an IPL.

18
Q

POST is an event that needs to be protected from

A

Being tampered.

19
Q

How to ensure that there is no information disclosure from the memory.

A

The BIOS can perform what is known as a destructive memory check during POST.

20
Q

Secure startup

A

All the processes and mechanism that assure the

environment’s TCB integrity when the system or software running on the system starts.

21
Q

TPM

A

Trusted Platform Module - it provides heightened tamperproof data protection during startup.

22
Q

The TPM chip can be used for

A

storing cryptographic keys and provide identification information from mobile devices for authentication and access management.

23
Q

How to determine the integrity of the system’s bootstrapping process.

A

TPM fingerprint

24
Q

Cold boot attack

A

The system shutdown and bootstrapping process can

be circumvented and sensitive information can be disclosed.

25
Interrupt the bootstrapping process and interject themselves as the program loads. Which Malicious Software?
Malicious Software (Malware) threat agents such as spyware and rootkits.