Lesson 7: Explain Resiliency and Site Security Concepts Flashcards

1
Q

Define a ‘acquisition/procurement’ policy

A

Policies and processes that ensure asset and service purchases and contracts are fully managed, secure, use authorized suppliers/vendors, and meet business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘total cost of ownership (TCO)’

A

The initial purchase price along with the ongoing costs of maintenance, updates, and potential security incidents associated with an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘Configuration management’

A

Ensures that each configurable element within an asset inventory has not diverged from its approved configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ‘Change control’

A

The process by which the need for change is recorded and approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define ‘change management’

A

The process through which changes to the configuration of information systems are implemented as part of the organization’s overall configuration management efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a ‘Service Asset’

A

Things, processes, or people that contribute to delivering an IT service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a ‘Configuration Item (CI)’

A

An asset that requires specific management procedures to be used to deliver the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define a ‘baseline configuration’

A

A list of settings that an asset, such as a server or application, must adhere to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define a ‘Security Baseline’

A

Minimum set of security configuration settings a device or software must maintain to be considered adequately protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a ‘configuration management system (CMS)’

A

The tools and databases used to collect, store, manage, update, and report information about CIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘Data deduplication’

A

Data compression technique that identifies and eliminates redundant data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define ‘On-site backups’

A

Backup that writes job data to media that is stored in the same physical location as the production system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define ‘Off-site backups’

A

Backup that writes job data to media that is stored in a separate physical location to the production system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can an organization identify potential issues in their data recovery process?

A

Testing backups/restore capabilities and making necessary improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a ‘Snapshot’

A

Image backup; Used to create the entire architectural instance/copy of an application, disk, or system at a specific point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a snapshot?

A

It is used in backup processes to restore the system or disk of a particular device at a specific time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a ‘VM snapshot’

A

Capture the state of a virtual machine, including its memory, storage, and configuration settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define a ‘Filesystem snapshot’

A

Capture the state of a file system at a given moment, enabling users to recover accidentally deleted files or restore previous versions of files in case of data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define a ‘SAN snapshot’

A

taken at the block-level storage layer within a storage area network which capture the state of the entire storage volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define ‘Replication’

A

Creating and maintaining exact copies of data on different storage systems or locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define ‘Journaling’

A

A method used by file systems to record changes not yet made to the file system in an object called a journal before the file indexes are updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define ‘Sanitization’

A

Process of removing sensitive information from storage media to prevent unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define ‘continuity of operations planning (COOP)’

A

Processes and procedures to ensure critical business functions can continue during and after a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of continuity of operations planning (COOP)?

A

Minimize downtime, protect essential resources, and maintain business resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are key components of continuity of operations planning (COOP)

A

Identifying critical business functions, establishing priorities, determining the resources needed to support these functions; Involves creating redundancy for IT systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the difference between continuity of operations planning (COOP) and Business continuity planning (BCP)?

A

Continuity of operations is a component of the broader business continuity concept; COOP is primarily concerned with the immediate response and restoration of critical functions, while business continuity encompasses a more comprehensive approach to ensure the overall resilience and recovery of the entire organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define ‘Capacity Planning’

A

Organizations assess their current and future resource requirements to ensure they can efficiently meet their business objectives to support anticipated growth or changes in demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the variables/subjects that are taken into account when Capacity Planning?

A

Personnel, storage, computer hardware, software, and connection infrastructure resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What might be taken into consideration when capacity planning for physical infrastructure?

A

Evaluating physical facilities to see if they can accommodate growth; Power, cooling, and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What metrics can an organization use to assist in capacity planning?

A

Trend analysis, simulation modeling, and benchmarking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define ‘Trend analysis’ and its function

A

Examines historical data to identify patterns and trends in resource usage, demand, and performance to forecast future resource requirements by understanding past patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define the purpose of ‘Trend analysis’

A

Help identify potential bottlenecks or other areas that require attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define ‘Simulation modeling’ and its function

A

Leverages computer-based models to simulate real-world scenarios; Assess the impact of changes in demand, different resource allocation strategies, or system configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define ‘Benchmarking’ and its function

A

A comparison of an organization’s performance metrics against industry standards or best practices; A way to identify areas for improvement and establish performance targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the ultimate goal of capacity planning?

A

Allows organizations to optimize resource allocation, reduce costs, and minimize the risk of downtime or performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are ‘people’ risks associated with capacity planning?

A

Insufficient staffing, skills gaps, lack of cross-training/succession planning, resistance to change, lack of employee engagement, or ineffective communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define ‘High availability (HA) clustering’

A

Redundant systems that can automatically take over operations in case of a failure, minimizing downtime.

38
Q

What does creating a high availability environment involve?

A

Designing and implementing hardware components, servers, networking, datacenters, and physical locations for fault tolerance and redundancy.

39
Q

What physical components attribute to high availability systems?

A

Redundant hardware components, such as power supplies, hard drives, and network interfaces.

40
Q

How is availability measured?

A

Measured as an uptime value, or percentage; Can also be calculated as the time or percentage that a system is unavailable (downtime).

41
Q

What timeframe is used to describe high availability?

A

24x7 or 24x365 days

42
Q

How is fault tolerance achieved?

A

By provisioning redundancy for critical components and single points of failure.

43
Q

Define ‘Failover’

A

A technique that ensures a redundant component, device, application, or site can quickly and efficiently take over the functionality of an asset that has failed.

44
Q

How does a load balancer provide failover capabilities?

A

Load balancer can detect when a server/site has gone down and redirect inbound traffic to other sites in the pool.

45
Q

Define a ‘Hot site’

A

A fully configured alternate processing site that can be brought online either instantly or very quickly after a disaster.

46
Q

Define a ‘Cold site’

A

A predetermined alternate location where a network can be rebuilt after a disaster.

47
Q

Define a ‘Warm site’

A

An alternate processing location that is typically dormant but can be rapidly converted to a key operations site if needed.

48
Q

Define ‘Geographic dispersion’

A

Processing and data storage resources are replicated between physically distant sites.

49
Q

What is the purpose of geographic dispersion?

A

To ensure that recovery sites are located far enough apart to minimize the impact of regional disasters.

50
Q

What are 3 ways to test high availability of a system/service?

A
  1. Load testing
  2. Failover testing
  3. Monitor system testing
51
Q

Define ‘load testing’ and its purpose

A

Software tools to validate a system’s performance under expected or peak loads and identify bottlenecks or scalability issues.

52
Q

Define ‘failover testing’

A

Validating failover processes to ensure a seamless transition between primary and secondary infrastructure.

53
Q

Define ‘Clustering’

A

A load balancing technique where a group of servers are configured as a unit and work together to provide network services.

54
Q

Define a ‘Virtual IP’ and its purpose/function

A

An IP address that is shared by nodes in a cluster/pool that allow a load balancer to direct traffic to the active servers in a pool without the use of multiple IPs.

55
Q

What protocol is used to implement a virtual IP address?

A

Common Address Redundancy Protocol (CARP)

56
Q

How does Common Address Redundancy Protocol (CARP) allow a group of nodes to share the same virtual IP?

A

The instances are configured with a private connection, on which each is identified by its “real” IP address, enabling the active node to “own” the virtual IP and respond to connections.

57
Q

How does the Common Address Redundancy Protocol (CARP) know which node in a pool is available to receive traffic?

A

The redundancy protocol also implements a heartbeat mechanism to allow failover to the passive node if the active one should suffer a fault.

58
Q

Define ‘Active/passive clustering’

A

If one node is active, the other is passive.

59
Q

Define ‘Active/active clustering’

A

Both nodes are processing connections concurrently.

60
Q

What is the biggest advantage of active/passive clustering?

A

Performance is not adversely affected during failover.

61
Q

Define ‘Application clustering’

A

Allows servers in the cluster to communicate session information to one another for fault tolerance.

62
Q

What are forms of power redundancy?

A
  1. Appliances with dual power supplies each connected to a different source
  2. Power Distribution Units (PDUs)
  3. Uninterruptible Power Supplies (UPSs)
  4. Generators
63
Q

Define a ‘power distribution unit (PDU)’

A

An advanced strip socket that provides filtered output voltage.

64
Q

What is the purpose of a power distribution unit (PDU)?

A

“Clean” the power signal; provide protection against spikes, surges, and under-voltage events; and integrate with uninterruptible power supplies (UPSs)

65
Q

Define a ‘Uninterruptible Power Supply (UPS)’ and its purpose

A

A battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

66
Q

Define a ‘Battery Backup’ and its purpose

A

Provisioned at the component level for disk drives and RAID arrays to protect any read or write operations cached at the time of power loss.

67
Q

Define ‘Platform diversity’

A

Concept in that refers to using multiple technologies, operating systems, and hardware or software components within an organization’s infrastructure.

68
Q

What is the purpose of platform diversity?

A

By incorporating a variety of platforms, businesses can reduce the risk of a single vulnerability or attack affecting their entire infrastructure.

69
Q

Why is it good to implement platform diversity?

A

A diverse technology landscape makes it more challenging for threat actors to navigate, as they must be familiar with multiple platforms and exploit techniques.

70
Q

Why is it insecure to rely on a single vendor and not implement vendor diversity?

A

Can create a single point of failure; Entire infrastructure is as risk if a vulnerability is discovered in the vendor’s products.

71
Q

What are the benefits to business function of implementing vendor diversity?

A

If a vendor stops doing business, goes bankrupt, or experiences a significant disruption, having alternatives helps maintain business continuity.

72
Q

Define ‘Deception and disruption technologies’

A

Cybersecurity resilience tools and techniques to increase the cost of attack planning for the threat actor.

73
Q

Define a ‘Honeypot’ and its purpose

A

Decoy system that mimics real systems and applications designed to allow security teams to monitor attacker activity and gather information about their tactics and tools.

74
Q

Define a ‘Honeynet’

A

A network of interconnected honeypots that simulate an entire network, providing a more extensive and realistic environment for attackers to engage with.

75
Q

Define a ‘Honeyfile’ and its purpose

A

Fake files that appear to contain sensitive information, used to detect attempts to access and steal data.

76
Q

Define ‘Honeytoken’ and its purpose

A

False credentials, login credentials, or other data types used to distract attackers, trigger alerts, and provide insight into attacker activity.

77
Q

Define a ‘Disruption strategy’ and its purpose

A

Aim is to raise the attack cost and tie up the adversary’s resources.

78
Q

What are examples of ‘disruption’ strategies?

A

Configuring a web server with multiple decoy directories or dynamically generated pages to slow down scanning; Using a DNS sinkhole to route suspect traffic to a different network, such as a honeynet.

79
Q

Define a ‘DNS sinkhole’

A

A temporary DNS record that redirects malicious traffic to a controlled IP address.

80
Q

Define a ‘Tabletop Exercise’

A

A discussion of simulated emergency situations and security incidents.

81
Q

What is the purpose of a Tabletop Exercise

A

To help identify knowledge, communication, and coordination gaps, ultimately strengthening the organization’s incident response capabilities.

82
Q

Define a ‘Parallel Processing Test’

A

Running primary and backup systems simultaneously to validate the functionality and performance of backup systems without disrupting normal operations.

83
Q

Why is physical security important to cybersecurity?

A

Provides the first line of defense against physical access to an organization’s critical assets.

84
Q

Describe authentication in physical security

A

Creates access lists and identifies mechanisms to allow approved persons through the barriers.

85
Q

Describe authorization in physical security

A

Creates barriers around a resource to control access through defined entry and exit points.

86
Q

Describe accounting in physical security

A

Records when entry/exit points are used and detects security breaches.

87
Q

Describe the concept of physical security through environmental design

A

Uses the built environment to enhance security and prevent crime.

88
Q

How is physical security through environmental design achieved?

A

Barricades; Entry/Exit points; Fencing; Lighting

89
Q

Define an ‘Access Control Vestibule (Mantrap)’

A

A secure entry system with two gateways, only one of which is open at any one time.

90
Q

Define a ‘physical access control system (PACS)’

A

A combination of hardware and software designed to control who can access specific locations within a building or site; Access cards, card readers, access control panels, and a centralized control network

91
Q

Define a ‘circuit alarm/sensor’

A

Circuit-based alarm that sounds when the circuit is opened or closed, depending on the type of alarm.

92
Q

What is the most secure version of a circuit alarm?

A

A closed-circuit alarm is more secure because it cannot be defeated by cutting the circuit like an open-circuit alarm.