暗記メーカー
ログイン
LEC 6
  • Julia Cristine Tadeo

  • 問題数 95 • 6/22/2024

    記憶度

    完璧

    14

    覚えた

    35

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    involves providing members of organization with detailed information enhance on instruction designed to prepare them to perform their duties securely

    security training

  • 2

    One of least frequently implemented but most beneficial programs

    security awareness program

  • 3

    high level manager to support promote and endorse findings of project

    champion

  • 4

    Leeds project and make sure sound project planning process is used

    project manager

  • 5

    should be managers or their representatives from various communities of interest

    team members

  • 6

    components of contingency plan

    incident response planning, disaster recovery planning, business continuity planning

  • 7

    detailed description of activities that occur during an attack

    attack profile

  • 8

    covers identification of, classification of, and response to an incident

    incident response planning

  • 9

    more reactive than proactive with the exception of planning that must occur to prepare IR teams to be ready to react to an incident

    incident response

  • 10

    set of activities taken to plan for, detect, and correct the impact

    incident response

  • 11

    intrusion detection systems, virus detection, system admin, end users

    mechanisms

  • 12

    incident recovery

    identify and resolve vulnerabilities, address safeguards, evaluate monitoring capabilities, restore data from backups, restore process and services, continuously monitor system, restore confidence

  • 13

    provide guidance in the event of a disaster

    disaster recovery plan

  • 14

    clear establishment of priorities, clear delegation of roles and responsibilities, alert key personnel, document disaster, mitigate impact, evacuation of physical assets

    disaster recovery plan

  • 15

    outlines re-establishment of critical business operations

    business continuity planning

  • 16

    three exclusive options in continuity strategies

    hot sites, warm sites, cold sites

  • 17

    fully configured computer facilities, all services and communication links, physical plant operations

    hot sites

  • 18

    doesn't include actual applications, application may not be installed in configured, required hours today is to become operational

    warm sites

  • 19

    rudimentary services and facilities, no hardware or peripherals, empty room

    cold sites

  • 20

    three shared functions in continuity strategies

    time-share, service bureaus, mutual agreements

  • 21

    hot, warm, cold, leased with other organizations

    time-share

  • 22

    provides service for a fee

    service bureaus

  • 23

    a contract between two or more organizations that specifies how each will assist the other and the event of a disaster

    mutual agreements

  • 24

    to get sites up and running quickly, organization ability to port data into new site's system

    off-site disaster data storage

  • 25

    three types of off-site disaster data storage

    electronic vaulting, journaling, shadowing

  • 26

    transfer of large batches of data, receiving server archives data

    electronic vaulting

  • 27

    transfer of live transactions to off-site, only transactions are transferred, transfer is real time

    journaling

  • 28

    duplicated databases, multiple servers, processes duplicated, three or more copy simultaneously

    shadowing

  • 29

    6 steps in contingency planning process

    identifying mission - or business-critical functions, identifying resources that support critical functions, anticipating potential contingencies or disasters, selecting contingency planning strategies, implementing contingency strategies, testing and revising strategy

  • 30

    control measure that reduces accidental security breaches

    information security education, training, and awareness

  • 31

    uses data classification schemes

    mandatory access control

  • 32

    data classification schemes

    each collection of information is rated, may use matrix or authorization

  • 33

    non-discretionary controls

    role-based, task-based

  • 34

    tied to the role a user performs

    role-based

  • 35

    ties to a set of tasks user performs

    task-based

  • 36

    all controls rely on:

    identification, authentication, authorization, accountability

  • 37

    unverified entity

    supplicant

  • 38

    seek access to a resource by label, mapped to one and only one entity

    identification

  • 39

    label is called an

    identifier

  • 40

    something a supplicant knows, has, is

    authentication

  • 41

    matches supplicant to resource, often uses access control matrix

    authorization

  • 42

    known as auditability, all actions on a system can be attributed to an authenticated identity, system logs and database journals

    accountability

  • 43

    prevent information from moving between the outside and inside world

    firewalls

  • 44

    5 major categories in processing mode

    packet filtering, application gateway, circuit gateway, MAC layer, hybrids

  • 45

    filtering firewall, examine header information and data packets

    packet filtering

  • 46

    inspect networks at the network layer

    Packet filtering

  • 47

    uses a state table

    stateful

  • 48

    tracks of the state in context of each packet

    stateful

  • 49

    installed on dedicated computer

    application gateway

  • 50

    used in conjunction with filtering router

    application gateway

  • 51

    goes between external request and web page

    proxy server

  • 52

    between trusted and untrusted network, exposed to risk, can place additional filtering routers behind, restricted to a single application

    resides in demilitarized zone

  • 53

    operates at transport level

    circuit gateway

  • 54

    authorization based on addresses

    circuit gateway

  • 55

    create tunnels between networks

    circuit gateway

  • 56

    designed to operate at Media Access sublayer

    Mac layer firewalls

  • 57

    able to consider specific host computer identity in filtering

    Mac layer firewalls

  • 58

    allows specific types of packets that are acceptable to each host

    mac layer firewalls

  • 59

    combined elements of other types of firewalls, elements of packet filtering and proxy servers or circuit gateways

    hybrid firewalls

  • 60

    inconsist of two separate firewall devices, each separate firewall system, but are connected to work in tandem

    hybrid firewalls

  • 61

    categorization by development generation

    first generation, second generation, third generation, fourth generation, fifth generation

  • 62

    static packet filtering, simple networking devices, filter packets according to their headers

    first generation

  • 63

    application level or proxy servers, dedicated systems, provides intermediate services for the requests

    second generation

  • 64

    stateful, uses state tables

    third generation

  • 65

    dynamic filtering, particular packet with a particular source, destination

    fourth generation

  • 66

    Kernel proxy, works in the windows NT executive, evaluates at multiple layers

    fifth generation

  • 67

    categorized by structure

    commercial-grade, small office/home office

  • 68

    State-alone, combination of hardware and software

    commercial-grade

  • 69

    configured application software, runs on general-purpose computer

    commercial-grade firewall systems

  • 70

    broadband gateways or DSL or cable modem routers

    small office/home office

  • 71

    firewall architectures

    configuration decision, packet filtering routers, screened host firewall, dual homed host, screened subnet firewalls with DMZ, socs servers

  • 72

    objectives of the network, organizations ability to develop and implement architecture

    configuration decision

  • 73

    lacks auditing and strong authentication and can degrade network performance

    packet filtering routers

  • 74

    combines packet filtering router with dedicated firewall: proxy server, allows router to pre-screen packets

    screened host firewall

  • 75

    application proxy examines at ______

    application layer

  • 76

    has two network interface cards

    dual homed host

  • 77

    dominant architecture used today, provides DMZ

    screened subnet firewalls with DMZ

  • 78

    protocol for handling TCP traffic through a proxy server

    SOCS servers

  • 79

    propriety circuit-level proxy server, places special SOCS client-side agents on each workstation

    SOCS servers

  • 80

    logic based on set of guidelines most commonly referred to as

    firewall rules

  • 81

    allows administrators to restrict content access from within network

    software filter

  • 82

    authentication systems

    RADIUS and TACACS, Kerberos

  • 83

    Access control for dial-up

    RADIUS and TACACS

  • 84

    metric key encryption to validate, keeps a database containing the private keys

    kerberos

  • 85

    automatic phone-dialing program that dials every number in a configured range in records number if modern picks up

    war dialer

  • 86

    similar to Kerberos, user first authenticated to an authentication server and receives a token

    secure European system for applications in multiple vendor environment

  • 87

    implementation of cryptographic technology, private and secure network connection

    VPN

  • 88

    data within IP packet is encrypted, but header information is not, allows user to establish secure link directly with remote host, encrypting only data contents of packet

    transport mode

  • 89

    organization established 2 perimeter tunnel servers

    tunnel mode

  • 90

    these servers act as _______, encrypting all traffic that will traverse and secured network

    encryption points

  • 91

    analysis and prioritization-business functions, identify and prioritize functions within organization units

    business unit analysis

  • 92

    series of scenarios showing impact

    attack success scenario development

  • 93

    estimate cost of best, worst, probable

    potential damage assessment

  • 94

    basis for classification as disastrous not disastrous

    subordinate plan classification

  • 95

    determine the extent of resulting damage

    threat attack identification and prioritization