Security Applications and Devices Flashcards

1
Q

Personal Firewalls

A
§ Software application that protects a single computer from unwanted Internet traffic
§ Host-based firewalls
§ Windows Firewall (Windows)
§ PF and IPFW (OS X)
§ iptables (Linux)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDS

A

Intrusion Detection System
Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIDS

A

Host-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

Network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion Detection Methods

A

Signature-based
Policy-based
Anomaly-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Loss Prevention (DLP)

A

Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Endpoint DLP System

A

Software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network DLP System

A

Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Storage DLP System

A

Software installed on servers in the datacenter to inspect the data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud DLP System

A

Cloud software as a service that protects data being stored in cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trusted Platform Module (TPM)

A

Chip residing on the motherboard that contains an encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Endpoint analysis

A
Anti-virus (AV)
Host-based IDS/IPS (HIDS/HIPS)
Endpoint Protection Platform (EPP)
Endpoint Detection and Response (EDR)
User and Entity Behavior Analytics (UEBA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bluetooth Attacks

A

Bluejacking

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bluejacking

A

Sending of unsolicited messages to Bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bluesnarfing

A

Unauthorized access of information from a wireless device over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly