Module 11 - Understanding Defense Flashcards

(77 cards)

1
Q

Which three foundational elements must cybersecurity analysts identify and secure to defend an organization’s network?

A

Assets, vulnerabilities and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which process groups an organization’s resources based on common characteristics to ensure appropriate protection levels?

A

Asset classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which term refers to anything of value to an organization that must be protected, such as servers, infrastructure, end devices, and data?

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which asset classification step involves determining the proper asset classification category such as Information assets, Software assets, Physical assets and Services?

A

Step 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which term describes any potential danger to an organizational asset?

A

A Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cybersecurity concept describes a weakness in a system or design that could be exploited by a threat actor?

A

A Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do assets collectively represent in terms of cybersecurity exposure to threat actors?

A

The organizations attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which process involves inventorying all devices and information owned or managed by an organization, and implementing protection policies for them?

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first step in the asset classification process, involving sorting assets into types such as information, software, physical, or services?

A

Step 1: Determining the proper asset identification category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of asset classification step requires identifying owners for each piece of software and every information asset?

A

Step 2: Establishing asset accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which step involves classification criteria might include sensitivity, business value, duration of relevance, and access restrictions?

A

Step 3: Determining criteria for classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which classification step involves adopting a consistent labeling system for identifying information and applying uniform protection?

A

Step 4: Implement a classification schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which term refers to identifying and enforcing consistency in hardware and software products across an organization to reduce complexity and improve maintenance?

A

Asset standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which stage of the asset lifecycle includes assembling, inspecting for defects, testing, and tagging an asset before moving it to active use?

A

Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which asset classification step involves determining the criteria for classification based on Confidentiality, Value, Time, Access rights and Destruction?

A

Step 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which lifecycle phase involves monitoring performance, applying patches, renewing licenses, and conducting audits over time?

A

Utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which asset lifecycle stage involves gathering justification data and adding the newly acquired item to inventory?

A

Procurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which stage aims to extend the productive life of an asset through upgrades or modifications?

A

Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which phase of the asset lifecycle is data wiped, hazardous parts handled safely, and the asset dismantled or discarded?

A

Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of vulnerability involves a threat actor impersonating a customer using stolen authentication tools like a PIN or smart card?

A

Phony transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of vulnerability results from a legitimate user making an incorrect transaction or input?

A

Data input errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the longest phase in an asset’s lifecycle, involving continuous performance checks and compliance-related actions?

A

Utiliazation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security approach uses multiple protective layers at the network edge, inside the network, and on endpoints to reduce the impact of a single security failure?

A

The Defense in depth approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which rare but devastating threat can result in the loss of all systems at a physical location?

A

Data center destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Which network device acts as the first line of defense, applying rules to permit or deny traffic before it reaches the internal network?
The Edge router
16
Which device performs deeper traffic filtering, tracks connection states, and can authenticate remote users to grant access to internal resources?
A firewall
16
Which newer analogy reflects how modern attackers may only need to bypass a few security layers to reach critical data, similar to removing specific leaves?
Security artichoke
17
Which layered defense analogy describes how a threat actor must peel away each security layer to reach protected data, like peeling an onion?
Security onion
18
Which device inside the network applies final filtering rules before traffic reaches its destination?
An internal router
19
In the security artichoke analogy, what does each “leaf” represent in the context of cybersecurity?
A point of access or network component that may expose data
20
Which security strategy ensures data remains protected by placing multiple, distinct layers of defense between cybercriminals and valuable assets?
Defense in depth
21
Which defense strategy involves using several different protective layers, such as a password-protected server, a locked building, and an electric fence?
Layering
21
Which principle ensures that even if one security layer is bypassed, several additional layers remain to stop the attacker?
Layering
22
Which strategy reduces user access to only what is necessary for their specific job function to reduce the risk of data exposure?
Limiting
23
Which defense principle is reflected by using file permissions and procedural safeguards like reviewing sensitive documents only in a monitored room?
Limiting
23
Which approach enhances security by using a variety of different authentication methods, products, or procedures so one attack method can't compromise every layer?
Diversity
24
Which principle protects a system by hiding sensitive details like operating system type or error messages from users and attackers?
Obscurity
24
What defense principle is applied when an organization uses a swipe card from one vendor and a fingerprint reader from another to control access?
Diversity
25
What security measure reduces the chances of exploitation by preventing cybercriminals from learning technical details such as software versions or hardware makes?
Obscuring
26
What final step in log management ensures that old log data is securely removed when no longer needed?
Disposing of log data
26
Which set of predefined settings acts as a template for configuring similar systems across an organization?
Baseline configuration
27
Which principle ensures internal security systems remain easy to configure and manage while appearing complex to external attackers?
Simplicity
28
Which process involves identifying, controlling, and auditing changes made to a system’s established baseline configuration?
Configuration management
29
Which part of configuration management ensures that operating systems are deployed with secure settings such as access control and logging?
Operating System hardening
29
What is the term for the standard configuration used when deploying systems like Windows workstations to ensure consistency across an organization?
Baseline configuration
30
Which type of logs record system-level events such as client requests, server responses, and successful user authentications?
Operating system logs
30
Which security feature records events as they happen and provides a chronological view of system activity?
Log files
31
Which type of log records details about file access, such as requests for specific system files?
Access log
31
Which type of log tracks user authentication attempts, helping to identify unauthorized login attempts?
Audit log
31
What process should organizations establish to handle increasing volumes of log data used for security monitoring?
Log management
32
Which documentation component tracks and organizes the assignment of IP addresses across systems?
IP schema
33
Which documented resources help maintain a consistent configuration across systems and include items like network maps and IP address schemas?
Configuration documentation
34
What type of diagrams are part of configuration documentation and show the physical layout of network infrastructure?
Cabling and wiring diagram
35
Which kind of operating system log data provides details like the number and size of transactions within a specific timeframe?
Usage information
36
Which type of logs are created by security software to detect malicious activity and support auditing and compliance?
Application security logs
37
Which type of log is useful for identifying long-term trends, spotting recurring problems, and proving regulatory compliance?
Security logs
38
Which tool intercepts and logs packets on a network to analyze traffic content and detect security issues?
protocol analyzer (packet sniffer)
39
Which tool examines each packet's field values and content to assess the nature of network traffic?
A packet analyzer
40
Which type of policies establish rules of conduct and responsibilities for both employees and employers, protecting rights and business interests?
Company policies
41
Which policies set rules regarding employee conduct, attendance, dress code, privacy, and other employment terms?
Employee policies
42
Which department typically creates and maintains policies related to employee salary, benefits, work schedules, and vacations?
HR (Human Resources) department
43
Which policies define security objectives, user behavior rules, and system requirements to protect an organization’s network and systems?
Security policies
44
Which security policy specifies who is authorized to access network resources and how identities are verified?
Identification and authentication policy
44
Which type of policy serves as a baseline for acceptable network use and helps detect possible security breaches when violated?
Security policies
45
Which policy document is continuously updated to reflect changes in threats, vulnerabilities, and business or employee needs?
Security policies
46
Which type of policies define the standards of correct behavior for the business and its employees overall?
Business or company policies
47
Which document demonstrates an organization’s commitment to security and sets rules for expected behavior?
A security policy
48
Which policy sets minimum requirements for passwords and mandates regular password changes?
Password policy
49
Which policy identifies acceptable network applications and uses, and may specify consequences for violations?
AUP (Acceptable Use Policy)
50
Which policy defines how remote users can access the network and what resources they can use remotely?
Remote access policy
51
Which policy specifies update procedures for network device operating systems and end-user applications?
Network maintenance policy
52
Which procedures describe how security incidents are handled within an organization?
Incident handling procedures
53
Which policy supports employees using their own mobile devices to access company systems and networks?
BYOD (Bring Your Own Device) policy
54
Which policy identifies which types of personal devices will be supported within an organization’s BYOD program, specify the goals of a BYOD program and outline which employees can bring their own devices?
BYOD security policy
55
Which BYOD best practice helps recover data if a device is lost or stolen?
Backing up data
55
Which BYOD best practice uses software to let IT implement security settings and manage all devices connected to company networks?
Using MDM (Mobile Device Management) software
56
What refers to the laws and codes of protecting information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction that network professionals must be familiar with?
INFOSEC (information security)