2.0 Protect Flashcards

1
Q

Data analytics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intrusion prevention systems and tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security vulnerability databases

A

CVE
CSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acceptable use policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network access control (NAC)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster recovery and business continuity plans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote work policies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active Directory Group Policy Objects (GPOs)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Footprinting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enumeration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gaining access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social-engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Man-in-the-middle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Out-of-band

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DDoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resource exhaustion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Forced system outage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packet generators

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Organizational structure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internal teams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Personnel roles and responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Communication policies and procedures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Knowledge sharing processes

A
30
Q

Conflict management

A
31
Q

Law enforcement

A
32
Q

Vendors

A
33
Q

Intrusion prevention systems (IPS)

A
34
Q

Intrusion detection systems (IDS)

A
35
Q

Firewalls

A
36
Q

Network segmentation

A
37
Q

Endpoint detection and response (EDR)

A
38
Q

least privilege

A
39
Q

Separation of duties

A
40
Q

Password enforcement policies

A
41
Q

Active Directory hygiene

A
42
Q

Patch management

A
43
Q

Mobile device management (MDM)

A
44
Q

Identify assets

A
45
Q

Cybersecurity polices and procedures

A
46
Q

Data security polices

A
47
Q

Cybersecurity auditing processes and procedures

A
48
Q

Audit objectives

A
49
Q

Network structure

A
50
Q

Compliance standard

A
51
Q

Document and communicate results

A
52
Q

Review assessments, audits, and inspections

A
53
Q

Analyze critical issues for action

A
54
Q

Develop plans of action

A
55
Q

Specify success criteria

A
56
Q

Remediation planning

A
57
Q

Resource implications

A
58
Q

Monitoring procedures

A
59
Q

Software updates

A

Scope
Attributes
Vulnerabilities

60
Q

Firmware updates

A

Scope
Attributes
Vulnerabilities

61
Q

Software patches

A
62
Q

Enterprise resources

A
63
Q

Access control

A
64
Q

Authentication systems

A
65
Q

Remote access monitoring

A
66
Q

Cybersecurity policies and procedures

A
67
Q

Identity management

A
68
Q

Authorization

A
69
Q

Infrastructure/physical security

A
70
Q

Physical security controls

A
71
Q

User credentials

A