Cybersecurity Essentials chapter 2, SKA Module 10 Defense in Depth, State of Data, Access Control;CIA

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Goals

What is identified by the first dimension of the cybersecurity cube?

2
New cards

Confidentiality, Integrity and Availability

What are the three foundational principles of the cybersecurity domain? (Choose three.)

3
New cards

confidentiality

What principle prevents the disclosure of information to unauthorized people, resources, and processes?

4
New cards

authorization

authentication

What are two methods that ensure confidentiality?

5
New cards

PII

classified

business

What are three types of sensitive information?

6
New cards

Authentication, authorization, accounting

What are three access control security services? (Choose three.)

7
New cards

Authorization

What service determines which resources a user can access along with the operations that a user can perform?

8
New cards

hashing, data consistency checks

Which two methods help to ensure data integrity?

9
New cards

SHA

MD5

What are two common hash functions? (Choose two.)

10
New cards

equipment maintenance

up-to-date operating systems

system backups

What three methods help to ensure system availability?

11
New cards

eliminate single points of failure

detect failures as they occur

provide for reliable crossover

What three design principles help to ensure high availability?

12
New cards

NAS

What name is given to a storage device connected to a network?

13
New cards

in-transit

in-process

at rest

What are the three states of data?

14
New cards

Encryption

authentication

tokenization

What are methods that ensure confidentiality?

15
New cards

Backup

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

16
New cards

gives security staff the backing of management

is not legally binding

defines legal consequences of violations

What three tasks are accomplished by a comprehensive security policy?

17
New cards

urgency

intimidation

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target?

18
New cards

SHA-256

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems for protection of sensitive, unclassified data. Which hash algorithm would you select?

19
New cards

HMAC

A VPN will be used within the organization to give remote users secure access to the corporate network. What does IPsec use to authenticate the origin of every packet to provide data integrity checking?

20
New cards

System resiliency

Being able to maintain availability during disruptive events describes which of the principles of high availability?

21
New cards

Asset Standardization

What is it called when an organization only installs applications that meet its guidelines, and administrators increase security by eliminating all other applications?

22
New cards

RAID

Which technology would you implement to provide high availability and redundancy on local servers for data storage?

23
New cards

identification and authentication policies

An essential part of a security policy

24
New cards

Updates cannot be circumvented.

Administrators can approve or deny patches.

Updates can be forced on systems immediately.

A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide?

25
New cards

Password Policy

A series of Group Policy settings that determine password security requirements, such as length, complexity, and age.

26
New cards

Baseline

A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?

27
New cards

AUP (Acceptable Use Policy)

Defines what action employees may or may not preform on company equipment, including computers, phones, printers, and even the network itself. This policy defines the handling of passwords, e-mail, and many other issues.

28
New cards

VPN

The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation?

29
New cards

SSH (Secure Shell)

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?

30
New cards

DNS

Which service will resolve a specific web address into an IP address of the destination web server?

31
New cards

SAN

network based storage system connected to high speed interfaces, allowing for improved performance;ability to connect multiple servers to a centralized disk storage

32
New cards

unauthorized access

data loss

What are two potential threats to applications? (Choose two.)

33
New cards

laws governing the data

As a security professional, there is a possibility to have access to sensitive data and assets. What is one item a security professional should understand in order to make informed ethical decisions?

34
New cards

PCI DSS

A breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?

35
New cards

GLBA

As part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?

36
New cards

CFAA

If a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?

37
New cards

FERPA

A school administrator is concerned with the disclosure of student information due to a breach. Under which act is student information protected?

38
New cards

confidential business information

national security and foreign policy information

law enforcement records that implicate one of a set of enumerated concerns

What are three disclosure exemptions that pertain to the FOIA?

39
New cards

Vulnerability Scanner

A security professional is asked to perform an analysis of the current state of a company network. What tool would the security professional use to scan the network only for security risks?

40
New cards

DAS

Type of storage most vulnerable to malicious attacks

41
New cards

RAID, NAS and SAN

Types of network storage which are secure but complicated to set up;Data at Rest

42
New cards

three methods used to verify identity

something you know

something you have

something you are

43
New cards

Privacy laws

protect you from an organization that may want to share your information

44
New cards

Sneaker Net

Uses removable media to physically move data from one computer to another

45
New cards

Tasks of a Comprehensive Security Plan

sets rules for expected behavior

defines legal consequences of violations

gives security staff the backing of management

46
New cards

Design Principles which insure high availability

detect failures as they occur

provide for reliable crossover

eliminate single points of failure

47
New cards

Lil Nas X

Old Town Road

48
New cards

Ice Spice

has a duet with Tay on the Midnights Album

49
New cards

Mrs. Edris' favorite band

Radiohead and the National

3 MULTIPLE CHOICE OPTIONS

50
New cards

Input, Output, Modification

Ways to control Data in Process

51
New cards

Sneaker net;wireless;wired

Challenges to Data in Transit

52
New cards

Protecting Data confidentiality

implement VPNs, SSL, IPsec and encrypting of data

53
New cards

Protecting Data Availability

Mutual authentication;backups;cloud storage

54
New cards

malicious code

one of the possible causes of corrupt data

55
New cards

incorrect use of data delimiters;improperly configured printers

an example of "outputed" data corruption