CCSP Cert Prep: 5 - 5. Security Baselines and Standards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Security baselines

What provides enterprises with an effective way to specify the minimum standards for computing systems, and efficiently apply them across deployed devices?

2
New cards

True

True or False?

Baselines can also dive into deeper detail, breaking out different requirements for different classes of systems and information. An organization might organize their security baseline controls based upon the highest classification of information stored, processed or transmitted by a system. For example, the security baseline might require that all data storage devices be encrypted when they're used to store highly sensitive information. 


3
New cards

standards

What describes how the organization will specifically achieve the baseline requirements on a particular system type?

4
New cards

monitor

Once administrators set baseline requirements and deploy those baselines across the enterprise, they should continue to _____ systems for compliance with the baseline.

5
New cards

Automated monitoring solutions

What type of solutions allow administrators to rapidly check thousands of systems against the baseline and identify any deviations that require investigation?

6
New cards
  1. vendors

  2. government agencies

  3. independent organizations

What are 3 sources for security standards?

7
New cards

customization

The security standards offered by industry experts are an excellent starting point for an organization's own security standards, but they're rarely ready to use out of the box and they often require _____ to meet the organization's own security requirements.

8
New cards

Virtualized

______ clusters increase the flexibility of our approaches to availability.

9
New cards

distributed resource scheduling

Many virtualization platforms offer a layer of abstraction between the physical servers running in a virtualized cluster and the virtual machines running on those resources.

VMware uses what approach where resources are grouped into resource pools that allow the balancing of capacity across devices?

10
New cards

VMotion

Administrators can move virtual machines between resource pools using a capability known as what?

11
New cards

automatically

Dynamic optimization means that workloads are shifted ______ .

12
New cards

VMotion, Dynamic optimization

Workload requirements change both cyclically and unpredictably based on demand. Administrators can use technology like _____ to manually move workloads between resource pools. Alternatively, the platform may use _____ strategies that automatically and seamlessly reassign workloads when it finds a more efficient allocation. 

13
New cards

maintenance

Another key feature of enterprise virtualization platforms is the ability to pull resources out of pools when repairs or maintenance becomes necessary. Administrators can place individual servers, storage clusters, and other virtualized resources into _____ mode. This approach reallocates active workloads to other resource pools, and allows physical work to take place on the device.

14
New cards

storage clusters

Using _____ also provides significant availability benefits. Technologies like RAID and snapshotting provide real-time backups of data stored on disk, allowing _____ to survive the failure of a small number of disks without any disruption.

15
New cards

NIST

What U.S. federal government agency publishes security standards that are widely used throughout the government and private industry?

16
New cards

True

True or False?

Security baselines often require hundreds or thousands of individual security settings on a particular device.

17
New cards

True

True or False?

Organizations often customize industry security standards to meet their specific security and business requirements.

18
New cards

VMotion

What technique can you use to move workloads between hardware environments in a VMware infrastructure?