Test Study 8 Flashcards

1
Q

What type of embedded OS is becoming more pervasive and has large public safety implications?

A

Vehicles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a reference template?

A

The sample of bio-metric data used for comparison in authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the sample of bio-metric data used for comparison in authentication called?

A

Reference template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What authentication server transmits authorization information in clear text?

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An employee is not performing per the standards of the company. Another employee has spent person time investigating this and proving it. What is the issue?

A

The other employee has not received authorization for an investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What items require:
Reasonable suspicion?
Probabl cause?

A

Reasonable suspicion - stopping someone

Probable cause - warrant, grand jury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of vendor fix is for a critical security issue?

A

Hot fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of vendor fix is a solution for a single issue?

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of vendor hot fix is a collection of fixes?

A

Service Pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is poly-instantiation a defense against?

A

Inference attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a defense against inference attacks?

A

Poly-instantiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are system operating rings also known as?

A

Privilege domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the steps of PICERF?

A
Prepare
Identify
Contain
Eradicate
Recovery
Follow Up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the steps for the CISSP incident response?

A
Detect
Respond
Mitigate
Report
Recover
Remediate
Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In PICERF, what happens in the prepare phase?

A

Properly train employees
Incident response drills and scenarios
Have approval and funding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In DRMRRRL, what happens in the detect phase?

A

Discover an incident, notify the security office.

17
Q

In PICERF, what happens in the Identify phase?

A

Determine whether you have been breached, how it was done, what the scope was, has root cause been found?

18
Q

In DRMRRRL, what happens in the response phase?

A

Determine the validity of detection, rule out false positives, determine if it still ongoing or over.
Formally declare an incident.

19
Q

In PICERF, what happens in the contain phase?

A

Contain the breach so it does not spread
Update and patch systems
Change passwords
Help restore from backup

20
Q

in DRMRRRL, what happens in the mitigate phase?

A

Immediate action upon declaration of the incident, dependent upon time, risk, and impact.
Stop the incident, take down servers, fix the damage.

21
Q

In PICERF, what happens in the eradication phase?

A

Eliminate the root cause
Patch systems
Re-image if necessary

22
Q

In DRMRRRL, what happens in the report phase?

A

Report to relevant stakeholders, management, regulators, and law enforcement about the incident

23
Q

In PICERF, what happens in the recovery phase?

A

Restore systems to production

Enable file integrity monitoring

24
Q

In DRMRRRL, what happens in the recovery phase?

A

Return the environment to normal operations

25
Q

In PICERF, what happens in the follow up phase?

A

After action meetings

Analyze and document everything bout the breach

26
Q

In DRMRRL, what happens in the remediate phase?

A

Address the root cause of the incident.