Systems Flashcards

(40 cards)

1
Q

What is an operating system (OS) really doing?

A

It acts as the middle layer between hardware and applications—managing CPU, memory, storage, processes, and user access so software can run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is the OS critical for security?

A

Because it controls access, permissions, processes, and system behavior—if compromised, the entire system is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a process in a system?

A

A running instance of a program that consumes system resources like CPU and memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do ISSOs care about processes?

A

Malicious processes can indicate compromise or unauthorized activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is memory (RAM) used for?

A

Temporary storage for active processes and data being used by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a server at a technical level?

A

A system designed to provide services, resources, or data to multiple clients over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an endpoint?

A

A user-facing device like a laptop or workstation used to access systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are servers higher risk than endpoints?

A

They host critical services and multiple users depend on them—compromise has wider impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give examples of servers.

A

Domain controller, web server, database server, file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give examples of endpoints.

A

Laptops, desktops, tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is authentication?

A

Verifying identity (username/password, smart card, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is authorization?

A

Determining what a user is allowed to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is least privilege important?

A

It limits damage if an account is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens if users have excessive privileges?

A

Increased risk of accidental or malicious system compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is system configuration?

A

Settings that control how a system operates (security, services, access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is configuration critical for security?

A

Misconfigurations are one of the most common vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is hardening in system terms?

A

Reducing vulnerabilities by securing configurations and disabling unnecessary features.

18
Q

Example of hardening?

A

Disabling unused services or enforcing password policies.

19
Q

What is a service?

A

A background process that performs a specific function (e.g., web server, authentication service).

20
Q

Why are services important for security?

A

Each service is a potential attack vector.

21
Q

What happens if unnecessary services are running?

A

Increased attack surface.

22
Q

What is patching?

A

Installing updates that fix bugs or security vulnerabilities.

23
Q

Why is patching critical?

A

Many attacks exploit known vulnerabilities that patches fix.

24
Q

What happens if systems are not patched?

A

They remain vulnerable to known exploits.

25
What are system logs?
Records of system activity (logins, errors, events).
26
Why are logs important?
They help detect and investigate suspicious activity.
27
What would suspicious log activity look like?
Multiple failed logins, unusual login times, unknown processes.
28
Why must ISSOs understand systems?
To verify security configurations and identify risks.
29
What is the “attack surface” of a system?
All potential entry points (services, ports, accounts).
30
How do you reduce attack surface on a system?
Disable services, close ports, apply STIGs, enforce policies.
31
If a server is compromised, what is the impact?
Data exposure, service disruption, lateral movement.
32
If an endpoint is compromised, what is the risk?
Credential theft and potential lateral movement.
33
Why are domain controllers critical?
They control authentication for the entire domain.
34
What happens if admin credentials are compromised?
Full control over systems and possibly the entire network.
35
Why is system security layered?
To prevent a single failure from causing total compromise.
36
What is defense-in-depth?
Multiple layers of security controls to protect systems.
37
Why is disabling unused services important?
It removes unnecessary entry points for attackers.
38
Why must ISSOs understand system roles?
To prioritize risk based on system importance.
39
What is the relationship between systems and vulnerabilities?
Vulnerabilities exist within systems and must be identified and fixed.
40
What is your role as an ISSO regarding systems?
Ensure systems are configured securely, compliant, and free of vulnerabilities.