100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SANS SEC 301 QUESTIONS WITH CORRECT ANSWERS $15.99   Add to cart

Exam (elaborations)

SANS SEC 301 QUESTIONS WITH CORRECT ANSWERS

 4 views  0 purchase
  • Course
  • SANS
  • Institution
  • SANS

Exam of 26 pages for the course SANS at SANS (SANS SEC 301)

Preview 3 out of 26  pages

  • August 3, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SANS
  • SANS
avatar-seller
julianah420
SANS SEC 301

Everyone can do everything they need to do and nothing more. Bradley Manning -
WikiLeaks Target - HVAC hack - answer Principle of Least Privilege

The cornerstone of all security: Everything done in security addresses one or more of
these three things
Confidentiality, Integrity, availability
Confidentiality - Only those who need to access something can; ties into principle of
least privilege
Integrity - data is edited correctly and by the right people. Failure ex.: Delta $5 tickets
round trip tickets to anywhere Delta flies/attach on pricing database
Availability - If you cannot use it, why do you have it? - answer CIA Triad

Pharmaceuticals and government, research - answer Confidentiality

Financials maintained in part by confidentiality - answer Integrity

eCommerce Ex. Amazon make $133,000/per minute thus denial of service is critical
business impact; power company need to keep lights on = availability issue - answer
Availability

Authentication, Authorization, Accountability – answer AAA

Detailed steps to make policy happen - answer Procedure

Policy, Procedure and Training - answerPPT

Users must know what policies and procedures say to follow them. - answerTraining

Broad general statement of management's intent to protect information - answerPolicy

A security professional needs to be:
1/3 technologist
1/3 manager
1/3 lawyer
-Tkhis is the perfect summation of the career field.
-Technology supports security efforts
-Management decisions (and budgets) drive security
-Legal issues mandate security requirements - answerSecurity by Thirds

Senior Mgmt:

,-Has legal responsibility to protect the assets of the org:
That give him the ultimate responsibility for security
-Authority can be delegated - responsibility cannot be
Data owner - person or office with primary responsibility for data; owners determine
classification, protective measures and more
Data custodian - the person/group that implement the controls; make the decisions of
the owner happens
Users - use data; are also automatically data custodians - answerSecurity Roles and
Responsiblities

safety of people - answerNumber 1 Goal of Security

years ago: teenagers

today: we face organized crime and nation states
-well funded
-highly motivated

disgruntled insider: difficult to counter; tends to be subtle; often damaging or even
devastating

Accidental insider: common; also tend to be subtle; in aggregate - even ore damaging

Outsider threat source - inside threat actor: a growing proble, the current most-common
attack vector

2014 - 47% of U. S. adults had private data compromised in a breach (NBC News)

FBI can prove it was North Korea that attacked Sony - answerNature of the Threat

- answerSecurity Policy

- answerSeparation of Duties

- answerAcceptable Use Policy

verify identity; is Keith really Keith?
(1) Verifying the integrity of a transmitted message. See message integrity, e-mail
authentication and MAC.

(2) Verifying the identity of a user logging into a network. Passwords, digital certificates,
smart cards and biometrics can be used to prove the identity of the client to the network.
Passwords and digital certificates can also be used to identify the network to the client.
The latter is important in wireless networks to ensure that the desired network is being
accessed. See identity management, identity metasystem, OpenID, human

, authentication, challenge/response, two-factor authentication, password, digital
signature, IP spoofing, biometrics and CAPTCHA.

Four Levels of Proof
There are four levels of proof that people are indeed who they say they are. None of
them are entirely foolproof, but in order of least to most secure, they are:

1 - What You Know
Passwords are - answerAuthentication

- answerBiometric

Control what they are allowed to do. Although we know Keith is Keith, what can Keith
do? - answerAuthorization

- answerAccountability

Harden, patch & monitor - answerHPM

Monitor what has been done. Although we know Keith is Keith, what did Keith do? -
answerAccountability

- answerAwareness Training Programs

Prevent /defense as much as you can; detect for everything else; or if the preventive
measures fail, respond to what is detected
-Prevention is ideal
-detection is a must
-detection without response is useless - answerPrevent/Detect/Respond (PRD)

The protection of data, networks and computing power. The protection of data
(information security) is the most important. The protection of networks is important to
prevent loss of server resources as well as to protect the network from being used for
illegal purposes. The protection of computing power is relevant only to expensive
machines such as large supercomputers. - answercomputer security

The protection of data against unauthorized access. Programs and data can be secured
by issuing passwords and digital certificates to authorized users. However, passwords
only validate that a correct number has been entered, not that it is the actual person.
Digital certificates and biometric techniques (fingerprints, eyes, voice, etc.) provide a
more secure method (see authentication). After a user has been authenticated,
sensitive data can be encrypted to prevent eavesdropping (see cryptography).

Authorized Users Can Be the Most Dangerous
Although precautions can be taken to authenticate users, it is much more difficult to
determine if an authorized employee is doing something malicious. Someone may have

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.99
  • (0)
  Add to cart