IS3110 CHAP 2 Flashcards
(45 cards)
What is a security policy?
- A rigid set of rules that must be followed explicitly to be effective
- A technical control used to enforce security
- A physical control used to enforce security
- A document created by senior management that identifies the role of security in the organization
A document created by senior management that identifies the role of security in the organization
You want to ensure that users are granted only the rights to perform actions required for their jobs. What should you use?
- Principle of least privilege
- Principle of need to know
- Principle of limited rights
- Separation of duties
Principle of least privilege
You want to ensure that users are granted only the persuasions needed to access data required to perform their jobs. What should you use?
- Principle of least privilege
- Principle of need to know
- Principle of limited rights
- Principle of limited permissions
Principle of need to know
Which of the following security principles divides job responsibilities to reduce fraud?
- Need to know
- Least privilege
- Separation of duties
- Mandatory vacations
Separation of duties
What can you use to ensure that unauthorized changes are not made to systems?
- Input validation
- Patch management
- Version control
- Configuration management
Configuration management
What are two types of intrusion detection systems?
- Intentional and unintentional
- Natural and manmade
- Host-based and network-based
- Technical and physical
Host-based and network-based
A technical control prevents unauthorized personnel from having physical access to a secure area or secure system.
TRUE OR FALSE
FALSE
What allows an attacker to gain additional privileges on a system by sending unexpected code to the system?
- Buffer overflow
- MAC flood
- Input validation
- Spiders
Buffer overflow
What is hardening a server?
- Securing it from the default configuration
- Ensuring it cannot be powered down
- Locking it in a room that is hard to access
- Enabling necessary protocols and services
Securing it from the default configuration
Which of the following steps could be taken to harden a server?
- Removing unnecessary services and protocols
- Keeping the server up to date
- Changing defaults
- Enabling local firewalls
- All the above
All the above
Which government agency includes the Information Technology Laboratory and published SP 800-30?
- NIST
- DHS
- NCSD
- US-CERT
NIST
ITL and ITIL are different names for the same thing.
TRUE OR FALSE
FALSE
Which US government agency regularly publishes alerts and bulletins related to security threats?
- NIST
- FBI
- US-CERT
- The MITRE Corporation
US-CERT
The CVE list is maintained by ___?
The MITRE Corporation
What is the standard used to create Information Security Vulnerability names?
- CVE
- MITRE
- DISA
- CSI
CVE
The amount that can be attacked on a server. Every additional service or protocol running or enabled increased the surface. By disabling services or protocols that are not needed, you reduce the surface
ATTACK SURFACE
A common exploit used against public-facing servers. Buffer overflow can occur when an attacker sends more data or different data than is expected. Attackers can use it to gain additional privileges on the system
BUFFER OVERFLOW
Standards used to ensure that systems are configured similarly. Additionally, you can perform compliance auditing regularly to ensure that systems have not been improperly modified.
CONFIGURATION MANAGEMENT
A philosophy centered on the principle that security requires continuous effort. You put controls into place. Later, you perform checks and audits to ensure they are still working as expected.
CONTINUOUS MONITORING
A buffer zone separating the Internet from the internal network. A DMZ is often created with two separate firewalls. You then place public-facing servers such as Web servers or email servers in the DMZ
DEMILITARIZED ZONE (DMZ)
An attack designed to prevent a system from providing a service. This is launched from a single client.
DENIAL OF SERVICE (DoS)
A major department in the US government. It is charged with protecting the United States from threats and emergencies.
DEPARTMENT OF HOMELAND SECURITY (DHS)
A DoS attack launched from multiple clients at the same time. These attacks often include zombies controlled in a botnet.
DISTRIBUTED DENIAL OF SERVICE (DDoS)
The act of initiating a vulnerability. It occurs when a command or program is executed to take advantage of a weakness. Some examples are buffer overflows, DoS attacks and DDoS attacks.
EXPLOIT