click below
click below
Normal Size Small Size show me how
SECURITY+
| Question | Answer |
|---|---|
| SLE | Single loss expetancy = Asset Value x Exposure factor% |
| Single Loss expectancy | how much loss experienced during one negative incident |
| AV | ASSet Value |
| EF | Exposure Factor Percentage of value loss when negative incident occurs IN the video exposure factor for 3 hours of downtime is calculated by 24/3 |
| ARO | Annualized rate of occurance Expected number of yearly occurances of an incident |
| ALE | Annualized Loss Expectancy = SLE x ARO Total yearly cost of bad things happening |
| Qualitative Risk Assesment | Based on subjective opinions regarding : -threat Liklihood -impact of realiced threat Threats given a severity rating low med hi 321 risk matrix & heat map |
| Risk Register | Centralized list of risks, severities, resposibilities, and mitigations |
| HBA | Host Bus Adapter- physical card u plug into computer or server to connect to a storage area network or other storage/network devic. The terms are primarily used to refer to devices for connecting SCSI, SAS, NVMe, Fibre Channel and SATA devices. |
| Authorization | Gaining acceess to a resoource (ccurs only after successfull authentication) |
| where do you store SSH public Keys? | On the server or the users home directory in the "Authorized Keys" folder |
| Virus | Program that can replicate only thru a definite user interaction Has some form of activation. |
| ransomware cryptoransomware cryptomalware | uses encryption to lock auser out of a system. attacker hides your data until you pay a ransom |
| worm | virus that once started, replicates itself more like a pathway for replication |
| Trojan horse | Program that looks benign or useful but hides nefarious programs or code insidde it... no replication by itself... Remote acces Trojan RAT- takes control of a system remotely |
| backdoor | Not necessarily bad created by devs as easy access point. can be exploited by attackers if left open. can be a program hackers us |
| PUP- Potentially Unwanted Program | Crapware adware spyware bloatware |
| Bots/Botnets | Distributed attack using remotely controlled malware controlling several machines . Often used in DDoS |
| EDR | Endpoint Detection and Response |
| Raid 0 | Disk stripping Requires at least 2 disks offers performance advantage but no avail or redundancy Data is segmented and striped across each disk appears as multiple disks |
| RAID 1 | Disk Mirroring Requires at least 2 disks... Looks like 1 disk Data in its entirety is written to 2 disks. performance and availability benefit. No fault tolerance |
| RAID 5 | Disk stripping with Distributed Parity . Requires atleast 3 disks. looks like 1 disk in system Data stripe and its related parity is stored on seperate disks can tolerate 1 disk failure |
| Parity (Raid ) | Error recovery or rebuilding information |
| RAID 6 | Requires at least 4 disks stores 2 parity stripes on ea disk can tolerate failure of 2 disks |
| RAID 10 | Raid level 1, then 0 Disk Mirroring, Then Stripping requires at least 4 disks |
| Packet Filetering Firewall goes to | Up to OSI layer 4 |
| Deep packet inspection firewall | Up to layer 7 |
| NGFW | Next Generation Firewal |
| FDE | Full DIsk Encryption- Ensures all data on a drive is encrypted... cant pull drive out of cpu and use it elsewhere |
| Partition Encryption | Encrypts individual partitions (Sections) of a drive Can have some encrypted and some unencrypted |
| File Encryption | encrypts individual files protects specific sensitive files |
| Volume Encryption | Encrypts an entire volume (logical data unit) of a hard drive Can be done on a drive, external drive, or a virtual drive broader than file encryption... more targeted than fde Can be thought of as a shelf or a rack in a library |
| Databases | Encrypts an entire database protects the whole collection of data in the database ... |
| Record Encryption | encrypts individual entries in a database records area single set of data in a database, like a row in the table |
| Control / Management Plane | responsible for determining the best path for data to travel from source to destination uses routing protocols to do this communicates changes in network topology |
| Data Plane | moves data to its final destination sometimes called the forwarding plane processes and transmits data packets. |
| Policy engine | Sets strict rules never assume anyone is harmless |
| Policy enforcement point | Ensures rules are followed by checking and verifying constantly |
| Policy automation | advanced tools to ensure discrepancies are caught and acted upn |
| load balancing | improves availability, and service performance. Horizontally auto-scaled |
| Horizontally auto scaled: scaling out | add servers |
| Horizontally auto scaled: Scaling in | remove servers |
| Round-Robin | Each request goes to the next backend server |
| Least-Connections | Each request is sent to the least busy backend server |
| Weighted Value | A relative numeric value assigned to each backend server |
| Server Clustering | Linking multiple servers together to operate as one system |
| RTO | |
| RPO | |
| MTTR | Mean Time To Repair |
| MTBF | |
| Granular Trap | |
| Verbose trap | |
| MIB | |
| OID | |
| Throughput | network performance metrics used to represent the actual measure of how much data is successfully transferred from a source to a destination in a given amount of time |
| Bandwidth | Theoretical speeed |
| DNS RECORDS | |
| Data Controller | Identifies purposes and conditions of the of data processing and ensures compliance with legal standards |
| BPA | Business Process Analysis |
| probability | Probability is a quantitative measure, usually expressed as a number between 0 and 1, or as a percentage, indicating the statistical likelihood of a risk event. |
| likelihood | Likelihood measures how probable it is that a risk will occur in a given time frame. |
| aro | |
| frequency | |
| Data custodian | |
| data processor | Data processors process data on behalf of the data controller |
| Data controller | A data controller determines the purposes and means of processing personal data, but the classification and alignment with organizational policies is typically under the purview of the data owner. |
| data owner | A Data owner is typically responsible for the data's classificationa dn insuring it is inline with the orgs security policy |
| EDR | Endpoint Detection and Response |
| Applications monitoring | |
| systems monitoring | |
| infrstructure monitoring | |
| The execution phase of security awareness | The Execution phase is where security awareness policies and procedures are put into operation, encompassing actions like user training, dissemination of awareness resources, and monitoring the efficacy of the awareness initiative. |
| optimization phase | Optimization is a post-execution phase, concentrating on refining and enhancing the security awareness programs based on outcomes and feedback, without direct involvement in its active implementation. |
| feedback phase | is before the execution. The Feedback phase involves gathering reactions and responses from users after the introduction of security policies, not necessarily involving active training or distribution of resources. |
| Inition phase | Initiation is the initial phase where potential security threats are recognized, but no policies or procedures have been formulated or implemented yet. |
| Key stretching | Key stretching is a method used that repeatedly hashing the password to make it more random and longer than it originally appeared. |
| Datamasking | Data masking is an obfuscation type which redacts the data by substituting the data with a character like an X or a *. The structure of the string is not changed so, for example, a 10 digit phone number would appear with 10 Xs. |
| Stagenography | Data is embedded in a picture or some other source |
| Tokenization | In Tokenization, the data is replaced with a token which has a different structure. The token is used to point to the data. Key stretching is not a data obfuscation technique. It is a technique used to protect passwords. |
| SOW | |
| BPA -Business Partners Agreement | Business Partners Agreement is a type of agreement that outlines the terms and conditions of a partnership between two organizations, not the specific instructions and requirements for a particular project. |
| MSA | A Master Service Agreement (MSA) establishes the overall framework for a long-term business relationship between an organization and a vendor. |
| Fines | Financial penalties |
| Sanctions | non fincial penalties |
| Mandatory access control | -Uses security labels to authorize resource access - Requires assigning security labels to both users and resources -Access is granted only if the user's label is equal to or higher than the resource's label |
| Discretionary access control | -● Resource owners specify which users can access their resources ● Access control based on user identity, profile, or role ● Allows resource owners to grant access to specific users |
| All the access controls | |
| SCAP | Security Content Automation Protocol |
| Which of the following statements about the importance of the Security Content Automation Protocol (SCAP) is NOT true? | SCAP encrypts all data before it is sent to be securely stored |
| Kelly Innovations LLC wants to expand its infrastructure across multiple geographical locations with an extensive network. Which of the following solutions would be the BEST for their situation? | SD-WAN |
| Risk Management Process steps in order TEST1 | TEST1 |
| Attribute based authentication control | |
| Rule based Authentication control | |
| Role based access control | |
| Discretionary | |
| Mandatory | |
| Passskey?????? | |
| Hardware Token | Like an RSA token |