2.0 Protect Flashcards
(71 cards)
1
Q
Data analytics
A
2
Q
Intrusion prevention systems and tools
A
3
Q
Security vulnerability databases
A
CVE
CSS
4
Q
Acceptable use policy
A
5
Q
Network access control (NAC)
A
6
Q
Disaster recovery and business continuity plans
A
7
Q
Remote work policies
A
8
Q
Active Directory Group Policy Objects (GPOs)
A
9
Q
Footprinting
A
10
Q
Scanning
A
11
Q
Enumeration
A
12
Q
Gaining access
A
13
Q
Web attacks
A
14
Q
Password attacks
A
15
Q
Wireless attacks
A
16
Q
Social-engineering
A
17
Q
Man-in-the-middle
A
18
Q
Malware
A
19
Q
Out-of-band
A
20
Q
DoS
A
21
Q
DDoS
A
22
Q
Resource exhaustion
A
23
Q
Forced system outage
A
24
Q
Packet generators
A
25
Organizational structure
26
Internal teams
27
Personnel roles and responsibilities
28
Communication policies and procedures
29
Knowledge sharing processes
30
Conflict management
31
Law enforcement
32
Vendors
33
Intrusion prevention systems (IPS)
34
Intrusion detection systems (IDS)
35
Firewalls
36
Network segmentation
37
Endpoint detection and response (EDR)
38
least privilege
39
Separation of duties
40
Password enforcement policies
41
Active Directory hygiene
42
Patch management
43
Mobile device management (MDM)
44
Identify assets
45
Cybersecurity polices and procedures
46
Data security polices
47
Cybersecurity auditing processes and procedures
48
Audit objectives
49
Network structure
50
Compliance standard
51
Document and communicate results
52
Review assessments, audits, and inspections
53
Analyze critical issues for action
54
Develop plans of action
55
Specify success criteria
56
Remediation planning
57
Resource implications
58
Monitoring procedures
59
Software updates
Scope
Attributes
Vulnerabilities
60
Firmware updates
Scope
Attributes
Vulnerabilities
61
Software patches
62
Enterprise resources
63
Access control
64
Authentication systems
65
Remote access monitoring
66
Cybersecurity policies and procedures
67
Identity management
68
Authorization
69
Infrastructure/physical security
70
Physical security controls
71
User credentials