19A: Employ Technical Controls Flashcards

3.5 Explain common attacks and vulnerabilities against specialized systems. 4.2 Given a scenario, analyze the findings and recommend the appropriate remediation within a report.

1
Q

Process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.

A

hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the process of thoroughly and completely removing data from a storage medium so that file remnants cannot be recovered.

A

sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Also referred to as encoding, substitutes special characters in HTML markup with representations that are called entities.

A

escaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A specific type of remediation; this is the concept of resolving a finding through changing how it is used or implemented.

A

process-level remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.

A

patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of periodically generating and implementing new access keys to a server/service.

A

key rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The practice of issuing, updating, and revoking digital certificates.

A

certificate management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of assigning a specific certificate to a particular element to avoid man-in-the-middle-attacks.

A

certificate pinning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A platform that controls passwords, key pairs and other sensitive information that should be stored securely.

A

secret management solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of dividing the system infrastructure into different physical or virtual subdivisions.

A

network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly