1.0 Flashcards

1
Q

Agentless protection

A

Has a central security server or application that monitors all devices on the network to enforce security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOAR

A

Automates tasks related to detecting and remediating exploits. IE: It can delete or quarantine a malicious file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run Book automation

A

Compiled procedures or task that can guide you or complete tasks for you via scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sliding window anomaly detection

A

Detects anomalies in real time and denies the associated packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary access control

A

(DAC) The owner decides permissions of the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat intelligence platform (TIP)

A

Platform that allows you to generate and collect data from many different places to assist in defending and remediating against malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk scoring vs Risk assessment

A

Risk assessment is to weigh the likelihood and the impact of a potential attack, risk scoring is giving that a score (usually red, yellow, or green) to compare it to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense-in-Depth

A

Implement security on all different layers.
1. physical with MFA.
2. technical controls such as VLANs or port control.
3. Administrative with policies such as limiting junior personals privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application security systems

A

Protects layer 5-7, found on device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory access control

A

The system automatically denies permission depending on the user and the sensitivity of the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nondiscretionary access control

A

Access based on different types of rules, such as IT, Security, and user groups and gives access to said groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule-based access control

A

Sets a rule for a file, such as you can only view the file or that you cannot delete it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Role-based access control

A

Sales team can access sales files and IT can access IT files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVSS terms:
Attack Vector
Attack complexity
Privileges required
User interaction
scope

A

Common Vulnerability Scoring System higher scores are more dangerous (10 is the highest)
Attack Vector: what it targets such as the network, physical or the system.
Attack complexity: how hard/how much information the need before executing
Privileges required: What level of privilege does the require in need to execute the exploitation.
User interaction: Does the attacker need any user interaction?
Scope: What other systems are affected if a system gets compromised?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly