Set 1 Flashcards

(88 cards)

1
Q

Backs up all files that have changed since the last full backup

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the OSI Layer does connection between applications on each computer?

A

Layer 5 (Session)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Default Subnet Mask for Class A Range

A

/8
255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the process of settings all data bits to zero, effectively erasing the data

A

Zeroization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do worms spread from system to system?

A

Software Vulnerabilities/Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the 3-way handshake?

A

SYN, SYN-ACK, ACK
Between client & server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adverse

A

Preventing success or development; harmful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Set of guidelines or rules that dictate how access control should be implemented

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most common form of risk when buying insurance

A

Transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What OSI Layer do TCP & UDP Operate at?

A

Layer 4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides automated log monitoring & analysis

A

Security Information and Event Management (SIEM) System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows owner of resource to configure access rules. Full control to configure what subjects can access the object

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An entity/resource that’s accessed by subject

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regulate access based on security labels assigned by central authority. More commonly used in the military and government

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is another name for host-based IDS/IPS products?

A

Endpoint Security Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Default Subnet Mask for Class C Range

A

/24
255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Users, resources & environment conditions to make access decisions

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Backs up all files that have changed since the last backup of any type

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management-oriented controls that provide directives and instruction aimed at people within the organization

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A list of all subjects and their respective permissions for a specific object

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What OSI Layer deal with transmitting & receiving bits?

A

Layer 1 (Physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What OSI Layer transmits & delivers frame throughout a LAN based on physical MAC addresses?

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Assigns access based on roles within an organization

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Defines the conditions under which access is allowed/denied

A

Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Attack that uses a spoofed IP Address in the ICMP message so traffic is sent to the wrong location
Smurf Attack
26
Default Subnet Mask for Class B Range
/16 255.255.0.0
27
Stores all of the files on the system each time the backup process is run
Full Backup
28
Emails sent to specific individuals/employees of organizations
Spear Phishing
29
An entity that's capable of accessing an object
Subject
30
What OSI Layer is responsible for routing and route selecting network packets on logical IP addresses?
Layer 3 (Network)
31
What logical address is assigned to devices connected to a network/Internet?
Internet Protocol (IP) Address
32
Used to map IP addresses to MAC addresses on a LAN
Address Resolution Protocol (ARP)
33
Network device used to enforce certain security rules that govern how traffic may flow
Network Firewall
34
Cloud provider gives customers self-service access to a pool of infrastructure resource (network, server, storage, etc.)
Infrastructure as a Service (IaaS)
35
Software service/application hosted by cloud provider and provided to customers
Software as a Service (SaaS)
36
Cloud service provider gives customers access to platforms where they can develop, test & run code for applications developed in various programming languages
Platform as a Service (PaaS)
37
Automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database
Logical Access Control
38
Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization
Defense in Depth
39
Management, operational and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity and availability of the system and its information
Security Controls
40
Centralized organizational function fulfilled by an information security team that monitors, detects and analyzes events on the network or system to prevent and resolve issues before they result in business disruptions
Security Operations Center
41
Collecting and storing user activities in a log, which is a record of the events occurring within an organization’s systems and networks
Logging
42
To protect private information by putting it into a form that can only be read by people who have permission to do so
Encrypt
43
The process and act of converting the message from its plaintext to ciphertext
Encryption
44
The total set of algorithms, processes, hardware, software and procedures that taken together provide an encryption and decryption capability
Encryption System
45
The reverse process from encryption. It is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and the appropriate key for decryption
Decryption
46
The right of an individual to control the distribution of information about themselves.
Privacy
47
System capabilities designed to detect and prevent the unauthorized use and transmission of information
Data Loss Prevention (DLP)
48
A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated
Configuration Management
49
Property that data has not been altered in an unauthorized manner
Data Integrity
50
Event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits
Incident
51
The process of detecting and analyzing incidents to limit the incident's effect
Incident Response (IR)
52
Documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization’s information systems(s)
Incident Response Plan (IRP)
53
Actions, processes and tools for ensuring an organization can continue critical operations during a contingency
Business Continuity (BC)
54
The documentation of a predetermined set of instructions or procedures that describe how an organization’s mission/business processes will be sustained during and after a significant disruption
Business Continuity Plan (BCP)
55
In information systems terms, the activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale
Disaster Recovery (DR)
56
The processes, policies and procedures related to preparing for recovery or continuation of an organization's critical business functions, technology infrastructure, systems and applications after the organization experiences a disaster
Disaster Recovery Plan (DRP)
57
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service
Threat
58
An individual or a group that attempts to exploit vulnerabilities to cause or force a threat to occur
Threat Actor
59
A threat actor carries out their objectives
Threat Vector
60
Entirety of the policies, roles and processes the organization uses to make security decisions in an organization
Security Governance
61
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Cloud Computing
62
The process of identifying and analyzing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals and other organizations
Risk Assessment
63
Lays out a process and timeline for actions in event a key executive/employee is lost to the organization
Succession Planning
64
Deployment of UPS/generators, communication link redundancy, fire detection & suppression systems
Preventive Controls
65
What OSI Model does a WAF operate at?
(Layer 7) Application
66
Checks for available IP addresses from a pool and automatically assigns them to client devices
Dynamic Host Configuration Protocol (DCHP)
67
Simplest and least expensive type of firewall and uses ACL to control traffic
Packet Filter
68
Specialized software that limits the websites users can access
Web Filter
69
Firewall on individual computer that allows or denies connections to that computer based on a set of rules
Host-Based Firewall
70
Priorities to evaluate the impact of threats to the business
Qualitative Risk Analysis
71
Hardware or software components that protect computing and network resources
Technical Controls
72
Control functionality which describes the protection a control provides. Communicate expected behavior
Directive Controls
73
An example of an administrative control
Security Awareness Training
74
Biometric authentication uses what type of security control?
Technical Controls
75
Separation of duties require job functions to be assigned so that one employee can't commit fraud by himself since the critical job function is split between 2 or more employees
Segregation of Duties
76
One department is responsible for governing, managing and configuring tools for access administration for all systems
Centralized
77
Access control is managed by different departments/people for different systems throughout the organization
Decentralized
78
Key component of detection and analysis phase of incident response plan
Reviewing Logs & Security Alerts
79
Preparation | Detection and Analysis | Containment, Eradication, and Recovery | Post-Incident Activity
Incident Response Process
80
What phase of the incident response process involves bringing systems and data back to normal operation?
Containment, Eradication, and Recovery
81
Example of biometric (Type 3) authentication factor
Facial Recognition
82
What phase of data lifecycle is data retained in order to comply with regulatory, legal, or other obligations?
Archive
83
Output of information that is run through a hash function
Message Digest
84
Backbone of security program. Lay out the requirements that everyone in the organization must follow
Security Policies
85
Value that is used as input into a cryptographic algorithm that allows for encryption and decryption operations to take place to transform plaintext to ciphertext
Cryptographic Key
86
Accuracy, consistency, and trustworthiness of data and systems
Integrity
87
Altering data without proper authorization is a breach of _?
Integrity
88
Method used as a protection against compromises of integrity?
Hashing