Domain 5: Security Operations Flashcards

(65 cards)

1
Q

What is the most important aspect of security awareness/training?

A

Protecting health and human safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way?

A

Data life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the life cycle of data handling?

A

Create, store, use, share, archive, destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do integrity services, provided by hash functions and digital signatures, allow a recipient to verify?

A

That a message has not been altered by malice or error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of security awareness training?

A

To align information security goals with the organization’s mission and vision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary purpose of storing passwords as hash values or digests?

A

To check if a password matches without revealing the password itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of security engineers in data security?

A

Security engineers figure out who is trying to log in and assess security codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How long does it take to crack a 10-number password using software with cryptographic calculation?

A

5 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is something which every security policy should have?

A

Consequences for non-compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term “whaling attacks” refer to in the context of phishing?

A

Attacks against highly placed officials or individuals with sizable assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of organization is likely to have a stricter acceptable use policy according to the passage?

A

Healthcare facility, research institution, or defense contractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What task is recommended for employees to practice what they’ve learned?

A

Sending simulated phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What solution is recommended for users who struggle to remember multiple passwords for different systems?

A

Encourage the use of a recommended password management solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is asymmetric encryption considered more secure?

A

It involves a unique code for the sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Egress monitoring regulate?

A

Data leaving the organization’s IT environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does hashing respond to minor changes in the input, such as misspellings or changes in letter case?

A

It generates a different hash digest for each input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of training in an anti-phishing campaign?

A

To increase the proficiency of staff in identifying phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which organizational policy is most likely to indicate which types of smartphones can be used to connect to the internal IT environment?

A

The BYOD policy (bring your own device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is meant by the term rollback?

A

Restoring the system to its previous state before a change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who is often tasked with coordinating the change management effort?

A

Information Security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the first step in the change management process?

A

Request for Change (RFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a mode of encryption which ensures confidentiality efficiently, with a minimum amount of processing overhead?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How should Logs be stored from the systems they’re logging

A

Separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which key is kept secret in asymmetric encryption?

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is "tailgating" in the context of social engineering?
The practice of following an authorized user into a restricted area or system ## Footnote either by asking to hold the door or through more sophisticated methods.
25
What are the five main properties that a cryptographic hash function must demonstrate to be useful and secure?
Useful, non-reversible, content integrity assurance, unique, deterministic
26
Why is an asset inventory so important?
You can't protect what you don't know you have
27
A set of security controls or system settings used to ensure uniformity of configuration throughout the IT environment. This is the definition of:
Baseline
28
Who is responsible for publishing and signing the organization's policies?
Senior management
29
What is a ready visual cue to let anyone in contact with the data know what the classification is?
Label
30
Application Server
A computer responsible for hosting applications to user workstations.
31
Asymmetric Encryption
An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext.
32
Checksum
A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data.
33
Ciphertext
The altered form of a plaintext message so it is unreadable for anyone except the intended recipients.
34
Classification
Classification identifies the degree of harm to the organization, its stakeholders or others that might result if an information asset is divulged to an unauthorized person, process or organization.
35
Cryptanalyst
One who performs cryptanalysis which is the study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security.
35
Configuration management
A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated.
36
Cryptography
The study or applications of methods to secure or protect the meaning and content of messages, files, or other information, usually by disguise, obscuration, or other transformations of that content and meaning.
37
Data Loss Prevention (DLP)
System capabilities designed to detect and prevent the unauthorized use and transmission of information.
38
Decryption
The reverse process from encryption. It is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and the appropriate key for decryption.
39
Digital Signature
The result of a cryptographic transformation of data which, when properly implemented, provides the services of origin authentication, data integrity, and signer non-repudiation.
40
Degaussing
A technique of erasing data on disk or tape (including video tapes) that, when performed properly, ensures that there is insufficient magnetic remanence to reconstruct data.
41
Egress Monitoring
Monitoring of outgoing network traffic.
42
Encryption
The process and act of converting the message from its plaintext to ciphertext.
43
Encryption System
The total set of algorithms, processes, hardware, software, and procedures that taken together provide an encryption and decryption capability.
44
Hardening
A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application, etc.
45
Hash Function
An algorithm that computes a numerical value (called the hash value) on a data file or electronic message that is used to represent that file or message and depends on the entire contents of the file or message.
46
Hashing
The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.
47
Ingress Monitoring
Monitoring of incoming network traffic.
48
Information Sharing
The requirements for information sharing by an IT system with one or more other IT systems or applications, for information sharing to support multiple internal or external organizations, missions, or public programs.
49
Message Digest
A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated.
50
Operating System
The software "master control application" that runs the computer. It is the first program loaded when the computer is turned on, and its main component, the kernel, resides in memory at all times.
51
Patch
A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component.
52
Patch Management
The systematic notification, identification, deployment, installation and verification of operating system and application software code revisions.
53
Plaintext
A message or data in its natural format and in readable form;
54
Records
The recordings (automated and/or manual) of evidence of activities performed or results achieved (e.g., forms, reports, test results), which serve as a basis for verifying that the organization and the information system are performing as intended.
55
Records Retention
A practice based on the records life cycle, according to which records are retained as long as necessary, and then are destroyed after the appropriate time interval has elapsed.
56
Remanence
Residual information remaining on storage media after clearing.
57
Request for change (RFC)
The first stage of change management, wherein a change in procedure or product is sought by a stakeholder.
58
Security Governance
The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization.
59
Symmetric encryption
An algorithm that uses the same key in both the encryption and the decryption processes.
60
Social engineering
Tactics to infiltrate systems via email, phone, text, or social media, often impersonating a person or agency in authority or offering a gift.
61
Web Server
A computer that provides World Wide Web (WWW) services on the Internet. It includes the hardware, operating system, Web server software, and Web site content (Web pages)
62
Intranet Server
A Web server that is used internally and not by the public.
63
Whaling Attack
Phishing attacks that attempt to trick highly placed officials or private individuals with sizable assets into authorizing large fund wire transfers to previously unknown entities.