1. r - -
2. What does every segment imply in this example of a permission. - ANS-First character "
- " is the file kind. Ex: normal-record or d for listing.
3.
4. Second phase method USER who owns the files permissions, rw manner that they are
able to examine & write.
5.
6. Third section method GROUP permissions, when set to: r - - means all people who isn't
always the consumer who owns the record or inside the organization can that owns the
document can read however write or execute it.
7. 3 types of permissions in File System ACL's ? - ANS-Read , Write , & Execute.
8. 6 Steps of Incident Response - ANS-Preparation, Detection / Analysis , Containment ,
Eradication , Recovery , & Post Accident Acitivity
9. Access Control List (ACL's) are? - ANS-Are lists containing statistics about what type of
access positive events are allowed to have for a given machine.
10. Access Controls - ANS-Are the tools and systems you operate to deny or allow get entry
to.
11. Administrative Controls - ANS-Controls are the rules that agencies create for
governance, an instance is appropriate use and e mail use regulations.
12. Allowing get admission to is - ANS-Is giving a celebration get admission to to a given
useful resource
13. Authorization - ANS-Is the procedure of determining precisely what an authenticated
birthday celebration can do.
14. CIA (acronym) - ANS-Confidential Integrity & Availability
15. Confidential is permitting only the ones legal to get admission to the statistics requested.
16. Integrity is preserving facts unaltered with the aid of Accidental or Malicious reason.
17. Availability is the capability to get admission to facts whilst needed.
18. Compliance - ANS-Is the necessities that are set forth via legal guidelines and industry
regulations which includes HIPPA/HITECH (Healthcare Industry) , PCI-DSS: Payment
Card Industry , FISMA: Federal Gov Agencies.
19. Controls - ANS-The manner we protect assets
20. Controls three Different Flavors - ANS-Physical , Technical/Logical , &. Administrative
21. Defense in Depth - ANS-An historic concept that is being carried out to the present day
records systems. Defense in depth is layering multiple controls on top of each other.
22. Denying get admission to is - ANS-Is the other of granting get right of entry to, you are
preventing a given birthday party from having access to the aid in query.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Ashley96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.