security Flashcards

skill set

1
Q

WHAT ARE SOME STRATEGIES FOR SECURE SYSTEMS

A

RISK ASSESSMENT
WHAT IS MOST IMPORTANT
LOSS OF EVENTS
FREQUENCY
IMPACT
MITIGATION
IMPLEMENTATION
COST
MAKE DECISION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved. COST VS BENEFITES

A

REASONABLE ASSURANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

INCLUES HARDWARE, SOFTWARE, DATA, NETWORK, FACILITIES PLAN A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.

A

DISASTER RECOVERY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CRITICAL BUSINESS PROCESS AND WHO SUPPORTS A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

A

BUSINESS CONTINUTIY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT NEEDS DONE - DELICATES RESPONSIBILITIES An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

A

SECURITY POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sysadmin, audit, network, security

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT DOES CIA TRIAD STAND FOR

A

CONFIDENTIALITY
INTEGRITY
AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT LEVEL OF CIA IS AUTHENTICAION METHOD SINGLE FACTOR

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT LEVEL OF CIA IS USER ROLES AND ACCOUNTS

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT LEVEL OF CIA IS DATA ENCRYPTION USED

A

APPLICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AT WHAT LEVEL OF CIA IS EDUCATION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AT WHAT LEVEL OF CIA IS AUTHENTICATION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AT WHAT LEVEL OF CIA IS ANTI VIRUS USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AT WHAT LEVEL OF CIAS IS DATA ENCRYPTION USED

A

END USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COMPANY MONITORS, MANAGES, MAINTAINS COMPUTER SECURITY

A

MSSP
MANAGED SECURITY SERVICE PROVIDER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT ARE STEPS TO RESPOND TO CYBER ATTACK

A

INCIDENT NOTIFICATION
PROTECTION OF EVIDENCE/ACTIVITY LOG
INCIDENT CONTAINMENT
ERADICATION
INCIDENT FOLLOW UP

17
Q

WHAT ARE THE TWO CERTIFICATION NEEDED FOR COMPUTER FORENSICS FOR LEGAL MATTERS

A

CCE - CERTIFIED COMPUTER EXAMINER
ENCE CERTIFIED EXAMINER MASTERED COMPUTER INVESTIGATION

18
Q

NAME SOME AUTHENTICATION METHODS FOR SECURE NETWORKS

A

FIREWALL
NEXT GENERATION FIREWALL
ROUTERS
ENCRYPTION
ENCRYPTION KEY
TLS - TANSPORT LAYER SECURITY
PROXY SERVER
VPN
INTRUSION DETECTION SYSTEM

19
Q

hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the Internet; also limits access to the company’s network based on the organization’s Internet-usage policy can be configured to serve as an effective deterrent to unauthorized web surfing by blocking access to specific objectionable websites.

20
Q

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

A

NGFW - NEXT GENERATION FIREWALL

21
Q

a gateway that passes data between one or more local area networks (LANs)

22
Q

communications protocol is used to secure sensitive data. a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet enables a client (such as a web browser) to initiate a temporary, private conversation with a server (such as an online shopping site or bank)

A

TLS - TRANSPORT LAYER SECURITY

23
Q

serves as an intermediary between a web browser and another server on the Internet that makes requests to websites, servers, and services on the Internet for you

A

PROXY SERVER

24
Q

is software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment

A

IDS - INTRUSION DETECTION SYSTEM

25
enables remote users to securely access an organization’s collection of computing and storage devices and share data remotely.
VPN - VIRTUAL PRIVATE NETWORK
26
An evaluation of whether an organization has a well-considered security policy in place and if it is being followed.
SECURITY AUDIT
27
an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack. Creating such a strategy typically begins with performing a risk assessment to identify and prioritize the threats that the organization faces.
SECURITY STRATEGY
28
Business processes that are more pivotal to continued operations and goal attainment than others.
MISSION CRITICAL PROCESS
29
An organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
SECURITY POLICIES
30
BRING YOUR OWN DEVICE
BYOD PROS - MORE EFFICEINT/FAMILIAR WITH DEVICE CONS - EXPOSE TO MALAWARE/PASSWORD PROTECTION/PRIVACY
31
NAME SOME AREAS OF POSSIBLE ENTRY POINTS TO ORGANIZATIONS DATA INFORMATION
CLOUD COMPUTING NETWORK COMPUTERS MOBILE DEVICES VIRTUALIZATION OPERATING SYSTEMS APPLICATIONS WEB SITES SWITCHES ROUTERS GATEWAY
32
Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
U.S. COMPUTER EMERGENCY READINESS TEAM US-CERT
33
FEDERAL GOV'T DOES NOT HAVE TO INFORM ORGANIZATION OF VULNERABILITY
VEP - VULNERABILITY EQUITIES PROCESS
34
NAME SOME CAUSES OF POOR SOFTWARE DESIGN
DO NOT KNOW HOW TO DESIGN QUALITY DO NOT TAKE TIME DO NOT FOLLOW RIGOUROUS ENGINEERING PRINCIPLES NOT LEARNING FROM PAST MISTAKES NOT UNDERSTANDING ENVIRONMENT PRESSURE TO GET TO MARKET
35
METHOD OR TECHNIQUE HAS CONSISTENTLY SHOWN RESULTS SUPERIOR TO THOSE ACHIEVED BY OTHER MEANS
BEST PRACTICE
36
ORGANIZATION CHOOSES TO ELIMINATE VULNERABILITY THAT GIVES RIST TO PARTICULAR RISK IN ORDER TO AVOID RISK ALTOGETHER
AVOIDANCE
37
An approach to minimizing the impact of software errors by independently implementing the same set of user requirements N times (where N could be 2, 3, 4 or more); the N-versions of software are run in parallel; and, if a difference is found, a “voting algorithm” is executed to determine which result to use.
N-VERSION PROGRAMMING
38
A description of how a product or process could fail to perform the desired functions described by the customer.
FAILURE MODE