Part-4 Flashcards

1
Q

BPA

A

Business partner agreement

What exactly is expected of each entity in terms of services, finances, and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MOU

A

memorandum of understanding

Usually not legally binding; less formal; they’re typically in acted as a way to expressed a desire for all parties to achieve the same goal in the agreed-upon manner; mutually beneficial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

I SA

A

Interconnection security agreement

This type of agreement is geared toward the information systems a partner Entities to ensure that the use of inter-organizational technology needs a certain security standards; legally binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAID

A

Redundant array of independent disks

This is a set of vendor independent specifications that support redundancy and fault tolerance for configurations on multiple devices storage systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAID 0

A

Data is written across multiple storage devices a.k.a. stripping, increasing performance. There is no redundancy of data , so a failure of one device affects the entire array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAID 1

A

Data is simultaneously replicated from one storage device to another I get a mirroring, decreasing performance. This provides redundancy, as data and I feel device may still be present on the mirrored device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID 5

A

Data is stripped across three or more disks with one extra block a redundancy called a parity block. this provides increased performance and ensures that data on one failed storage device can be reconstructed from the parity block and the other functional devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAID 6

A

This is the same as raid five except it uses one or more block of parity. This provides increased redundancy, as data onto field devices can be a reconstructed from the two parity blocks and the other functional devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-persistence

A

Is the property by which a computing environment, typically a virtual one, is discarded once it has finished its assigned tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you enable persistence?

A

You can’t enable nonpersistence through the use of snapshots also known as checkpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Live boot

A

The operating system is not installed on the system storage device rather runs directly and ram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

High availability

A

The property that expresses how closely systems approach the goal of providing data availability 100% of the time while maintaining a high level of system performance.

An uptime rating of 99.9% or three nines is a very high level of availability, resulting in less than nine hours of downtime for a year. 49’s, or 99.99% uptime results in less than an hour of downtime for year but comes with an associate a proportional increase in cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DAS

A

Direct attached storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NAS

A

Network attached storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAN

A

Storage area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PGP

A

Pretty good privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MIME

A

Multipurpose Internet mail X tensions

18
Q

GPG

A

GNU privacy guard

19
Q

Data sensitivity

A

Public, private, restricted, confidential

20
Q

Physical security controls

A
Deterrent
Preventative
Detective 
corrective
compensating 
technical
 administrative
21
Q

Man trap door

A

The system is also referred to as a dead man door, it is a system with the door at each end of a secure chamber.

22
Q

Data exfiltration

A

This is the process by which and I talk or text data that is stored inside of a private network and music to an extra no network, therefore the victim no longer has complete control over the data.

23
Q

Anomalies in event logs

A

Multiple consecutive authentication failures.

Unscheduled changes to the systems configuration.

Excessive or unexplained critical system failures or application crashes.

Excessive consumption of band with recorded in network device logs

Sequencing errors are gaps in the event log. And attacked and we tried to cover their tracks by deleting portions of the log or modifying the log.

24
Q

Forensic response procedure

A
Capture forensic image and memory
Examine network traffic and logs
Capture video
Take hashes
Take screenshots
25
Q

The order of volatility

A

Volatile to least volatile

  1. CPU registers , CPU cache, and RAM
  2. network caches and virtual memory
  3. Hard drives and flash drives
  4. CD-ROMs, DVD-ROMS and printouts
26
Q

COOP

A

Continuity of operations also known as business continuity. This is a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event

27
Q

Disaster recovery process

A
Notify stakeholders
 begin emergency operations 
assess to damage
Assess the facility
Begin recovery process
28
Q

Order of restoration

A

This dictates what types of systems your prior choice in your recovery efforts. Not all systems are equal in the eyes of the organization.

29
Q

Recovery sites

A

hotsite
warm site
cold site

30
Q

Hot site

A

This is a fully configured alternate network that can be online quickly after disaster.

31
Q

Warm site

A

A location that is dormant or performs non-critical functions under normal conditions, but can be rapidly converted to a key operations site if needed.

32
Q

Cold site

A

This is a predetermined alternate location where network can be rebuilt after disaster.

33
Q

What are the different types of back ups?

A

Full back up
differential back up -all selected files that have changed since the last full backup are backed up

incremental back up-all files that have changed since the last full or incremental backup(which ever is the most recent)

34
Q

Data sovereignty

A

This describes the social political outlook of a nation concert in computing technology and information

35
Q

BCP

A

Business continuity plans

A policy that describes in ratifies the organizations overall business continuity strategy. It should identification of critical systems and components to ensure that such assets are protected. It should address infrastructure issues such as maintaining utility services, utilizing high-availability or fault tolerance systems that can withstand failure, and creating and maintaining data back ups.

36
Q

DRP

A

Disaster recovery plan. This is the Policy that describes in ratifies the organizations recovery strategy.

37
Q

IT contingency plan

A

This is a component of the BCP that specifies alternate IT procedures that you can switch over to you when you are faced with an attack or disruption of service leaving to a disaster for the organization.

38
Q

Back out contingency plan

A

This is it documented plan that includes specific procedures and processes that are applied in the event that a change or modification me to a system must be undone

39
Q

Succession plan

A

This ensures that all key business person I’ll have one or more designated back ups who can perform critical functions when needed.

40
Q

Fail over

A

This is a technique that ensures ever done a component, device, or application quickly and efficiently take over the functionality of an asset that has failed.

41
Q

Testing exercises

A

Walk-throughs, workshops, orientation seminars, tabletop exercises, functional exercises, full-scale exercises

42
Q

AAR/LLR

A

After action report, lessons learned report

This includes an analysis of events that can provide insight into how you may improve your response processes in the future.