module 20 Flashcards

1
Q

What does it mean if a system is completely secure.

A

No one has access to it and it’s therefore unstable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CIA stand for?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(CIA) This means the information should only be know to authorized users.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(CIA) This means that the information is stored and transferred as intended and that any modification is authorized.

A

integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(CIA) This means that the information is accessible to those authorized to view or modify it.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

We’ve gone over “active” security threats. What is a “passive” security threat?

A

A screw up or oversight on my part.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality concerns are made up of 3 categories. (Snooping, Eavesdropping/wiretapping, and social engineering/ dumpster diving). Which of the 3 is being described below?

This is any attempt to get access to information on a host or storage device (data at rest) that you are not authorized to view. An attacker might steal a password or find an unlocked workstation with a logged-on user account, or they might install some sort of spyware on the host.

A

snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality concerns are made up of 3 categories. (Snooping, Eavesdropping/wiretapping, and social engineering/ dumpster diving). Which of the 3 is being described below?

This is snooping on data or telephone conversations as they pass over the network. Snooping on traffic passing over a network is also often called sniffing. It can be relatively easy for an attacker to “tap” a wired network or intercept unencrypted wireless transmissions. Networks can use segmentation and encryption to protect data in-transit.

A

eavesdropping/ wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality concerns are made up of 3 categories. (Snooping, Eavesdropping/wiretapping, and social engineering/ dumpster diving). Which of the 3 is being described below?

This means getting users to reveal information or finding printed information. We’ll discuss this topic in more detail later in this unit.

A

Social engineering/dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity concerns is comprised of 3 categories (On-path attack, replay, and impersonation). Which of the 3 is being described below?

A host sits between two communicating nodes, and transparently monitors, captures, and relays all communications between them. This type of attack may be able to change the messages exchanged between a sender and receiver without them realizing. To protect against this, senders and receivers must authenticate themselves and use encryption to validate messages.

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity concerns is comprised of 3 categories (On-path attack, replay, and impersonation). Which of the 3 is being described below?

Where a host captures another host’s response to some server and replays that response in an effort to gain unauthorized access. These attacks often involve exploiting an access token generated by an application. The application needs to use encryption and time-stamping to ensure that the tokens cannot be misused.

A

replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity concerns is comprised of 3 categories (On-path attack, replay, and impersonation). Which of the 3 is being described below?

A common attack is where a person will attempt to figure out a password or other credentials to gain access to a host. The attacker can then hijack the authorizations allocated to the account and generally masquerade as that user. There are numerous ways to perform these types of attacks, but an obvious one is to capture password packets in transit and work out which bit the password is. Many vendors have addressed this issue, to some extent, by encrypting the password packets. But the encryption systems used are not strong enough, and various utilities are available that allow users to break even encrypted password packets through brute force, given enough time.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DoS stand for?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does UPS stand for?

A

Uninterrupted Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Availability concerns are compromised of 5 categories (Denial of Service [DoS], Power outage, Hardware failure, Destruction, and Service outage). Which of the 5 categories is being described below?

Any situation where an attacker targets the availability of a service. This type of attack might tamper with a system or try to overload it in some way. On the web, another variant of this attack uses hosts compromised with bot malware to launch a coordinated attack against a web service. The size of the botnet determines how easily the attacker can overwhelm the service.

A

DoS Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Availability concerns are compromised of 5 categories (Denial of Service [DoS], Power outage, Hardware failure, Destruction, and Service outage). Which of the 5 categories is being described below?

If you lose power, then clearly your computers cannot run. Using standby power can help mitigate this issue. It’s also common for data corruption to occur when a computer is turned off rather than being shut down. Using an Uninterruptible Power Supply (UPS) can provide a means to safely close down a server if building power is interrupted.

A

power outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Availability concerns are compromised of 5 categories (Denial of Service [DoS], Power outage, Hardware failure, Destruction, and Service outage). Which of the 5 categories is being described below?

If a component in a server fails, then the server often fails. A hard disk contains moving parts and will eventually fail. If a disk fails, you will likely lose access to the data on the failed disk and quite possibly lose the data. You can compensate against this type of threat by provisioning redundant components and servers. The service is then configured to failover to a working component or server without interruption.

A

hardware failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Availability concerns are compromised of 5 categories (Denial of Service [DoS], Power outage, Hardware failure, Destruction, and Service outage). Which of the 5 categories is being described below?

The loss of service through this threat can occur for a number of reasons. At one extreme, you might lose a data center through a fire or even an act of terrorism. At the other end of the spectrum, you might lose access to a server when a person accidentally spills coffee on a server or a malicious person deliberately smashes a computer. Either way, putting your servers in a physically secure room and controlling access to that room can help protect against these issues.

A

destruction

20
Q

Availability concerns are compromised of 5 categories (Denial of Service [DoS], Power outage, Hardware failure, Destruction, and Service outage). Which of the 5 categories is being described below?

Many organizations use online, cloud-based apps and services these days. You need to consider how third-party service failures may affect your data processing systems. When you decide which cloud provider to use, consider the options they provide for service availability and fault tolerance.

A

service outage

21
Q

There are three types of “access control” discussed in COMPTIA itf+. (authentication, authorization, and accounting). Which of these are being described below?

One or more methods of proving that a user is who they say they are and associates that person with a unique computer or network user account.

A

authentication

22
Q

There are three types of “access control” discussed in COMPTIA itf+. (authentication, authorization, and accounting). Which of these are being described below?

Creating one or more barriers around the resource such that only authenticated users can gain access. Each resource has a permissions list specifying what users can do. Resources often have different access levels, for example, being able to read a file or being able to read and edit it.

A

authorization

23
Q

There are three types of “access control” discussed in COMPTIA itf+. (authentication, authorization, and accounting). Which of these are being described below?

Recording when and by whom a resource was accessed.

A

accounting

24
Q

What refers to means of getting users to reveal confidentiality information or obtaining unauthorized physical access to a resource.

A

social engineering

25
What does SSID stand for?
Service Set Identifier
26
What does CCTV stand for?
Closed-Circuit Television
27
What key combination locks Windows?
WINDOWS + l
28
To kelp protect against losing access to a computer system when a component fails, you must implement __________.
fault tolerance
29
Fault tolerant systems are those that contain additional components to help avoid what?
single points of failures
30
Most contingency plans depend on providing __________ at both the component and system level.
redundancy
31
What does RAID stand for?
redundant array of independent disks
32
Different RAID solution are defined in numbered levels. What are the two most common levels of redundancy solutions called?
mirroring striping
33
What is RAID mirroring also know as?
RAID 1
34
What is RAID striping with parity also known as?
RAID 5
35
This type of RAID uses two disks. Each write operation is performed on both disks so that one is a mirror of the other. Read operations can use either disk. If one of the disks fails, the array will continue to work. What type of RAID is this?
RAID 1 or mirroring
36
This type of RAID uses a minimum of three disks combined into a single logical drive. Data is written in stripes across all disks in the set. A calculation is performed to determine what is known as parity information. The parity data is written to a different disk with each write operation. In the event of a single disk failure, the parity information in each stripe of data is used to determine the missing data. If a second disk fails however, then the whole array will fail. What type of RAID is this?
RAID 5 or striping with parity
37
What is a logical drive?
A virtual drive storage unit created within a physical storage device.
38
Is RAID a substitute for backups?
No.
39
Enterprise servers and networking equipment are often provisioned with two power supply units so that if one fails, it does not cause power loss. What is this called?
dual power supplies
40
Critical infrastructure might provision multiple power circuits so that if one fails, there will not be total power loss across all systems. What is this called?
redundancy circuits
41
What do you call a large battery that can continue to provide power to connected devices for a few or possibly tens of minutes in the event of building power loss?
UPS
42
What does UPS stand for?
uninterrupted power supply
43
UPS batteries cannot provide power indefinitely, they will not be able to maintain service during an extended period of building power loss. A local power generator provides redundancy for this sort of eventuality. What is this called?
backup power generator
44
What creates workflows and resources to use when a specific disaster scenario affects an organization?
disaster recovery
45