Messer exam 1 Flashcards
(82 cards)
fencing
the process of** isolating a node of a computer cluster or protecting shared resources** when a node appears to be malfunctioning.
Authentication token
piece of information that verifies the identity of a user to a website, server, or anyone requesting verification of the user’s identity.
Biometrics
the process of using electronic devices to identify people by recording and analyzing their unique physical or behavioral characteristics. used to access door
Lighting
for outside building
Security guard
protect lobby
Access badge
used for door entrance
Access control vestibule
also known as a mantrap, is a physical access control system that creates a space between two sets of interlocking doors. used in lobby
operational
are often implemented by people instead of systems.
Security guards and awareness programs are examples of an operational control
managerial
are **administrative controls associated with security design **
and implementation. ```
A set of policies and procedures would be an example of a
managerial control
Physical
are used to** limit physical access**.
Badge readers, fences, and guard shacksare categorized as physical controls
Technical
are implemented using systems. Operating system controls,
firewalls, and automated processes are considered technical controls.
Something you have
During the login process, ```
your phone receives a
text message with a one-time passcode
~~~
something you know
PIN
something you are
bio metrics–fingerprint
somewhere you are
Your login will not work unless you are
connected to the VPN
Passive reconnaissance
**gathering as much information from
open sources such as social media, corporate websites, and business **
organizations
Vulnerability scanning
Some active reconnaissance tests will query systems directly to see if a
vulnerability currently exists
Supply chain analysis
will examine the security associated with a
supplier, and the analysis will not provide any information regarding a
company’s own servers and data
Regulatory audit
A regulatory audit is a detailed security analysis based on existing laws or
private guidelines. A regulatory audit commonly requires access to internal
systems and data
**DMARC ****(Domain-based Message Authentication Reporting and Conformance)**
specifies the disposition of spam emails. The legitimate
owner of the originating email domain can choose to have these messages
accepted, sent to a spam folder, or rejected
SPF (Sender Policy Framework)
is
a list of all authorized mail servers for a specific domain. All legitimate emails would be sent from one of the
servers listed in the SPF configuration
NAC (Network Access Control)
is a way to limit network access to only
authorized users. NAC is not commonly used to manage the transfer of
email messages.
DKIM (Domain Keys Identified Mail)
provides a way to validate all
digitally signed messages from a specific email server. DKIM does not
determine how the receiving server categorizes these digitally signed
messages
Root cause analysis
The goal of a root cause analysis is to explain the ultimate cause of an
incident. Once the cause is known, it becomes easier to protect against
similar attacks in the future