Chapter 3/4 Flashcards

1
Q

Hardware device that can get on wired or wireless connection

A

Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collection of software tools to control and secure endpoints from single console

A

Unified endpoint management (UEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Set of tech to protect endpoint against various attacks

A

Endpoint protection/security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Combines endpoint monitoring and log analysis for network events to detect and respond to incidents at endpoint

A

EDR & ETDR (Endpoint and threat detection and response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall that combines packet filtering firewall with other tech to detect and block network attack

A

Next gen firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tech and process used to prevent accidental or intentional actions to of sensitive organizational data

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall that runs on host and controls host inbound and outbound network traffic

A

Host based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Program that runs on a host and can detect a threat

A

Host based intrusion detection system (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Program that runs on host and can detect and prevent threats

A

Host based intrusion prevention system (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Method to secure drive data with encryption

A

Full disk encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A HDD or SSD with encryption circuitry built into drive

A

Self encrypting drive (SED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hierarchical database that stores configuration settings in Windows OS

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port number between 0 and 1,023

A

Well known port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port number between 1,024 and 49,151

A

Registered port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port number between 49,152 and 65,535

A

High number port (private/dynamic port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software update to address specific problem in program

A

Hot fix

17
Q

Simple sign of and documentation forms

A

Chain of custody forms

18
Q

Documents where data most likely to be lost due to operations or processes

A

Order of volatility

19
Q

Legal holds are often one of the first parts of electronic discovery, process allows each side of case to obtain evidence from each other

A

E-discovery

20
Q

DD, FTK, and Winhex

A

Forensic acquisition tools