Other Information Flashcards

1
Q

Digital Forensics Lifecycle (4 parts)

A

(NIST) Evidence Collection, Evidence Examination, Evidence Analysis, Investigations Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response basic phases (6)

A

Analysis, Response, Containment, Eradication, Recovery, Postmortem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM Process/Functions (4)

A

Collect, Aggregate, Correlate, Analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Start of Threat Management

A

Identify and Understanding threats with the greatest likelihood of occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Management Model (4)

A

Threats, Vulnerabilities, Remediation, Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability Management Approaches (3)

A

Patch Management, Vulnerability Assessment, Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ISAC

A

Information Sharing and Analysis Center Presidential Executive Directive in 1998, 25 covering all industry sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the P6 Maturity Model

A

People, Policies, Procedures, Process, Products, Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 boxes of Pen test

A

Environment Knowledge based - Black (know nothing), Grey (Know little), White (Knowledge substantial), Crowd Source (multiple testers, professional hackers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident Response/Management Response vs Threat Hunting

A

Threat Hunting is proactive, Incident/Management Response is Reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three types of Threat Hunting

A

Exploratory, Structured, Guided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 phases of Threat Hunting

A

Create Hypothesis, Investigate via Tools and Techniques , Uncover New Patterns & TTPs, Inform and Enrich Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Triple A (AAA)

A

Authorization, Authentication, and Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CRUD Security Matrix

A

Privilege use for performing Create, Read, Update, Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 behavior Management Techniques

A

Separation of Duties, Banners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 common Access Control Models

A

DAC (Discretionary Access Control), MAC, Mandatory Access Controls), RBAC (Role-based Access Control), ABAC (Attribute-based Access Control)

17
Q

Access Administration Lifecycle

A

Provision, Review, Remove

18
Q

SCIF

A

Sensitive Compartmented Information Facility

19
Q

Data Center Tiers

A

Tier 1 (99.67) - Tier 2 (99.749) - Tier 3 (99.982) - Tier 4 (99.995/ 2 delivery paths)

20
Q

OWASP

A

Open Web Application Security Project. Top 10 mobile device risks

21
Q

OSI Model (1-7)

A

Physical (Notarization/Signature), Data Link (Assurance/Availability), Network (Confidentiality), Transport (Data Integrity), Session (Non-Repudation), Presentation (Access Control)