Objective Solutions
CIA triad (Confidentiality, Integrity, Availability)
AAA Of Security Correct Answer - Authentication, Authorization, and
Accounting
Checksums Correct Answer - Method to verify the integrity of data
during transmission
Digital Signatures Correct Answer - Ensure Both Integrity of data during
transaction
Server Redundancy Correct Answer - Involves using multiple servers in
a load balanced or failover configuration so that if one is overloaded or fails,
the other servers can take over the load to continue supporting your end
users
Network Redundancy Correct Answer - Ensures that if one network path
fails, the data can travel through another route
data redundancy Correct Answer - involves storing data in multiple
places
Power Redundancy Correct Answer - involves using backup power
sources, like generators and ups systems
Non-repudiation Correct Answer - provides undeniable proof in the
world of digital transactions. Cant deny participation or authenticity of their
actions
Syslog servers Correct Answer - used to aggregate logs from various
network devices and systems so that system administrators can analyze them
to detect patterns or anomalies in the organizations systems
Technical Controls Correct Answer - "technology", hardware, and
software mechanisms that are implemented to manage and reduce risks
, Managerial Controls Correct Answer - ("Managing" things) also referred
to administrative controls, involve the strategic planning and governance side
of security
Operational Controls Correct Answer - Procedures and measures that
are designed to protect data on a day to day basis. Are mainly governed by
internal processes and human actions
Preventive Correct Answer - Proactive measures implemented to thwart
potentical security threats or breaches
Deterrent Controls Correct Answer - Discourage potential attackers by
making the effort seem less appealing or more challenging
Detective Controls Correct Answer - (detect) Monitor and alert
organizations to malicious activities as they occur
Corrective Controls Correct Answer - Mitigate any potential damage and
restore our systems to their normal state
Compensating Controls Correct Answer - Alternative measures that are
implemented when primary security controls are not feasible or effective
Directive Controls Correct Answer - Guide, inform, or mandate actions.
Often rooted in Policy.
gap analysis Correct Answer - Process of evaluating the differences
between an organizations current performance and its desired performance
Zero Trust Correct Answer - Demands verification for every device, user,
and transaction with the network
Data plane Correct Answer - Ensures policies are properly executed
honeypot Correct Answer - decoy systems to attract and deceive
attackers