100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

SANS GICSP (Study Questions for SANS GICSP) CORRECTLY ANSWERED 2024.

Beoordeling
-
Verkocht
1
Pagina's
27
Cijfer
A+
Geüpload op
03-11-2023
Geschreven in
2023/2024

SANS GICSP (Study Questions for SANS GICSP) CORRECTLY ANSWERED 2024.

Instelling
SANS GICSP
Vak
SANS GICSP










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SANS GICSP
Vak
SANS GICSP

Documentinformatie

Geüpload op
3 november 2023
Aantal pagina's
27
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

  • access control models

Voorbeeld van de inhoud

SANS GICSP (Study Questions for SANS GICSP ) CORRECTLY ANSWERED 2024
Access Control Models Answer - Information Flow
Non Interference
Confidentiality of Stored Information
- Bell-LaPadula (Mandatory Access Control) - Access Matrix (Read, Write or Execute or R/W/X)
- Take-Grant (Rights = Create, Revoke, Take and Grant
Integrity of Stored Information
- Biba Integrity Model (Bell-LaPadula upside down)
- Clark-Wilson
Mandatory Access Control (MAC) Answer - Permissions to objects are managed centrally by an administrator. Is an access policy determined by the system, rather than by the owner. Organizations use this in multilevel systems that process highly sensitive data such as classified govt or military.
Examples: 1) Rule-based, 2) Lattice Model
Discretionary Access Control (DAC) Answer - Is an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to a file and what privileges they have.
Role Based Access Control (RBAC) Answer - A method of implementing discretionary access controls in which access decisions are based on group membership, according to organization or functional roles.
LDAP - Lightweight Directory Access Protocol Answer - An Internet Protocol (IP) and
data storage model that supports authentication and directory functions. It is a remote access authentication protocol. Vendors = Microsoft Active Directory, CA eTrust Directory, Apache Directory Server, Novell eDirectory, IBM SecureWay and Tivoli Directory Server, Sun Directlry Server. OpenLDAP and tinyldap open source versions.
User Account Answer - Allows a user to authenticate to system services and be granted authorization to access them; however, authentication does not imply authorization.
Service Account Answer - Is an account that a service on your computer uses to run under and access resources. This should not be a user's personal account. Can also be an account that is used for a scheduled task (e.g., batch job account) or an account that is used in a script that is run outside of a specific user's context. (Ref GIAC White Paper)
Default Account Answer - System login account predefined in a manufactured system to permit initial access when system is first put into service. (pciscanner)
Guest Account Answer - For users who don't have a permanent account on your computer or domain. It allows people to use your computer without having access to personal files. Per MSFT cannot install software or hardware, change settings, or create a password. (MSFT)
Account expiration Answer - A time limit that is applied to the life of an account, so that it can be used only for a predetermined period of time. (MSFT)
Access Control List (ACL) Answer - List of subjects (including groups, machines, processes*) that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete and create. (Harris) (*NIST)
Access Reconciliation Answer - The action of making accounts consistent. A process
used to compare two sets of records to ensure the data are in agreement and are accurate.
Configuration Control Answer - Process of controlling modifications to hardware, firmware, software and documentation to protect the information system against improper modification prior to, during, and after system implementation. (NIST)
Baseline Configuration Answer - A set of specifications for a system that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures. Used as a basis for future builds, releases, and/or changes. (NIST)
Baseline Answer - A process that identifies a consistent basis for an organization's security architecture, taking into account system-specific parameters, such as different operating systems. (Dummies)
A minimum level of security necessary throughout the organization (CISA)
Configuration Auditing Answer - Check that:
- Change was recorded correctly and work matched the Request for Change (RFC)
- Change had appropriate risk level
- Configuration items updated appropriately
- Documentation updated (CISCO)
WSUS - Windows Server Update Services Answer - Next version of automatic updates for internal use. Built into Windows Server 2003. Previously called Software Update Services (SUS) and Windows Update Services (WUS) but now obsolete.
(Day 3, Page 56-57) Attack - Man-in-the-Middle (MITM) Answer - A type of attack in which an attacker intercepts messages between two parties and forwards a modified version of the orginal message. (Dummies)
Attack - Spoofing Answer - Technique used to forge TCP/IP packet information or email header information. In network attacks it is used to gain access to systems by impersonating the IP address of a trusted host. In email the sender address is forged
to trick an email users into opening or responding to an email. (Dummies)
Attack - Social Engineering Answer - A low tech attack method that employs techniques such as dumpster diving and shoulder surfing. (Dummies) A practice of obtaining confidential information by manipulation of legitimate users (ISA)
Attack - Denial of Service (DoS) Answer - An attack on a system or network with the intention of making the system or network unavailable for use. (Dummies) In the context of ICS, can refer to loss of process function, not just loss of data communictions. (ISA)
Data Manipulation Answer - A process of altering register data so as to change output status, without altering the ladder program. (www.toolingu.com)
Attack - Session Hijacking Answer - Similar to Man in the Middle Attack, except that the attacker impersonates the intended recipient instead of modifying messages in transit. (Dummies)
Unauthorized Access Answer - - Occurs when user, legimate or unauthorized, accesses a resource that the user is not permitted to use. (FIPS 191)
- Viewing private accounts, messages, files or resources when one has not been given permission from the owner to do so. Viewing confidential information without permission or qualifications can result in legal action. (Business Dictionary)
Health, Safety and Environmental (HSE) Answer - Responsibility for protecting the health and safety of workers and surrounding community and maintaining high environmental stewardship. (ISA)
Safety - Process Hazard Analysis (PHA) (aka Process Hazard Evaluation) Answer - is a set of organized and systematic assessments of the potential hazards associated with an industrial process. Provides information to assist managers and employees in making decisions for improving safety and reducing the consequences of unwanted or unplanned releases of hazardous chemicals. (Wiki)
Safety - HAZOP - Hazard Operations - Hazard and Operability Study Answer - A Qualitative Technique.
Is a structured and systematic examination of a planned or existing process or operation in order to identify and evaluate problems that may represent risks to personnel or equipment, or prevent efficient operation. This technique was initially developed to analyze chemical process systems but has later been extended to

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5008
Lid sinds
4 jaar
Aantal volgers
3556
Documenten
51950
Laatst verkocht
1 dag geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.9

912 beoordelingen

5
436
4
160
3
166
2
45
1
105

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen