Cybersecurity Compliance Framework & System Administration | Coursera |
Module 1 – Compliance Frameworks and Industry Standards
Compliance and Regulations for Cybersecurity
1. Which of the bad guys are described as “They are “in” an organization but are human and make mistakes”?- Malicious Insiders
- Inadvertant Actor
- Employees
- Outsiders
- Testing
- Technical
- Physical
- Operational
- 2018
- 2017
- 2016
- 2014
- Accountability of Compliance
- Security of Public Data
- Consent
- Rights of EU Data Subject
System and Organization Controls Report (SOC) Overview
1. Which is the foundational principle that everyone will get during a SOC audit?- Privacy
- Availability
- Security
- Confidentiality
Industry Standards
- Informational
- Technical
- Operational
- Physical
- Security Personnel
- Workforce Training and Management
- Access Controls
- Integrity Controls
- 5
- 10
- 12
- 20
CIS Critical Security Controls
- Implementation Group 3
- Implementation Group 1
- Do not need a controls implementation group due to maturity of my organization
- Implementation Group 2
Compliance Frameworks and Industry Standards
- An event on a system or network detected by a device.
- An event that has been reviewed by analysts and deemed worthy of deeper investigation.
- An event that has been identified by correlation and analytics tools as a malicious activity.
- All cybersecurity events.
- Readiness assessment, establish scope, testing/auditing, management reporting, gap remediation
- Establish scope, readiness assessment, testing/auditing, management reporting, gap remediation
- Readiness assessment, establish scope, gap remediation, testing/auditing, management reporting
- Establish scope, readiness assessment, gap remediation, testing/auditing, management reporting
- Controller
- Analyst
- Processor
- Data Subject
- ISO 27003
- ISO 27018
- ISO 27017
- ISO 27001
- Type 1
- Type 2
- Type 1 and Type 2
- Type 3
- Completeness
- Accuracy
- Timeliness
- Consistency
- Cyber Security and Infrastructure Security Agency (CISA)
- Department of Homeland Security
- US Department of Health and Human Services Office of Civil Rights
- US Legislature
- Weekly
- Monthly
- Quarterly
- Annually
- Advanced
- Basic
- Organizational
- Foundational
Module 2 – Client System Administration, Endpoint Protection and Patching
Client System Administration and Endpoint Protection
1. Which is NOT an example of a client?- Cellphone
- Laptop
- Personal Computer
- e-mail Server
- threat hunting
- detection response
- basic operations
- user education
- Enrollment Options pane
- Audit pane
- Software Inventory pane
- Endpoint Security pane
Patching
- delete
- improve
- update
- fix
2. Which two types of updates do most organizations patch as soon as possible after testing?
- Critical and Software
- Security and Service Paks
- Critical and Service Paks
- Security and Critical
Client System Administration, Endpoint Protection and Patching
- SQL Injection
- Whale hunting
- Spear Phishing
- Ad Network
- One-Time patching process.
- Automatic policy creation for endpoints.
- Continuous monitoring.
- Zero-day OS updates.
- Island Hopping
- Ransomware
- Water Hole
- Spear Phishing
- important and moderate
- high and important
- critical and important
- critical and high
- Monthly
- Weekly
- Annually
- As soon as patches are released
- Summary page
- File List page
- Patch Management page
- Logs page
Module 3 – Server and User Administration
Windows Administration
1. Which three (3) objects are typically managed by active directory?- Network User
- Local Accounts
- Services
- Volumes
- Service groups
- Data groups
- Distribution groups
- Security groups
- single sign on
- delegated authentication
- distributed authentication
- interoperability
- Policy change
- Privilege Use
- System events
- Process tracking
Linux Basics
- False
- True
- Run Level 0: Halt
- Run Level 1: Single User
- Run Level 5: Graphical
- Run Level 6: Reboot
Server and User Administration
- \Users
- \Program Files
- \System
- \AppData
- Guest
- HelpAssistant
- Administrator
- Network Service
- A Set of rules
- A query and index mechanism
- A replication services
- A global catalog
- AWS Active Directory
- Windows Admin Center
- Network Admin Center
- Privileged Admin Center
- Directory service access
- Object access
- Account management
- Account logon
- reboot
- grep
- shutdown -r
- init 6
- Internal commands
- External commands
Module 4 – Cryptography and Compliance Pitfalls
Cryptography Basics
- Hashing
- Digital Signatures
- Public key encryption
- Symmetric key encryption
- at rest only.
- in use only.
- in transit only.
- at rest, in use, and in transit.
- Missing encryption of data and communications
- Implementing a reliable and proven cryptography
- Using hardcoded/predictable weak keys
- Relying on algorithms being secret
- True
- False
- ccrypt -decrypt topsecret.cpt
- ccrypt -x topsecret.cpt
- ccat topsecret.cpt
- ccencrypt topsecret.cpt
Openpgp
- Prevents attackers from reading an email’s contents
- Prevents attackers from intercepting an email
- Prevents attackers from blocking the transmission of the message
- Prevents attackers from performing replay attacks
- Your public key
- Your private key password
- Your email account password
- Your friend’s public key
Cryptography and Compliance Pitfalls
- True
- False
- Do use hard to guess keys and store them correctly.
- Do rely on your own encryption algorithms.
- Do encrypt all sensitive data, at rest, in use, and in transit.
- Do rely on proven algorithms.
- Select cryptographically-random keys, do not reuse keys for different installs.
- Use a new random initialization vectors every time.
- Phase them out
- Store keys in secure keystores.
- ccrypt -K confidential.cpt
- ccrypt -c confidential.cpt
- ccrypt -u confidential.cpt
- ccrypt -x confidential.cpt
- Your public key
- Your coworker’s private key
- Your coworker’s public key
- Your private key