Chapter 5 Flashcards

(13 cards)

1
Q

is the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems and software, including the operating system, web server, application server and applications, etc. In this module, we will introduce configuration management practices that will ensure systems are installed and maintained according to industry and organizational security standards.

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

they are part of implementing controls to protect classified information.

A

Security labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information and data should be kept only for as long as it is beneficial, no more and no less.

A

retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

policies indicate how long an organization is required to maintain information and assets.

A

Records retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the primary form of instrumentation that attempts to capture signals generated by events.

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are any actions that take place within the systems environment and cause measurable or observable change in one or more elements or resources within the system.

A

Events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are implemented to protect against unauthorized changes to log information.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to surveillance and assessment of all inbound communications traffic and access attempts.

A

Ingress monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is used to regulate data leaving the organization’s IT environment.

A

Egress monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is used to protect information by keeping its meaning or content secret and making it unintelligible to someone who does not have a way to decrypt (unlock) that protected information.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The objective of every encryption system is to transform an original set of data, called the plaintext, into an otherwise unintelligible encrypted form, called ___?

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated. It is both a decision-making process and a set of control processes.

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a minimum level of protection that can be used as a reference point.

A

security baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly