2.0 Protect Flashcards

(71 cards)

1
Q

Data analytics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intrusion prevention systems and tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security vulnerability databases

A

CVE
CSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acceptable use policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network access control (NAC)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster recovery and business continuity plans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote work policies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active Directory Group Policy Objects (GPOs)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Footprinting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enumeration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gaining access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social-engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Man-in-the-middle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Out-of-band

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DDoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resource exhaustion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Forced system outage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packet generators

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Organizational structure
26
Internal teams
27
Personnel roles and responsibilities
28
Communication policies and procedures
29
Knowledge sharing processes
30
Conflict management
31
Law enforcement
32
Vendors
33
Intrusion prevention systems (IPS)
34
Intrusion detection systems (IDS)
35
Firewalls
36
Network segmentation
37
Endpoint detection and response (EDR)
38
least privilege
39
Separation of duties
40
Password enforcement policies
41
Active Directory hygiene
42
Patch management
43
Mobile device management (MDM)
44
Identify assets
45
Cybersecurity polices and procedures
46
Data security polices
47
Cybersecurity auditing processes and procedures
48
Audit objectives
49
Network structure
50
Compliance standard
51
Document and communicate results
52
Review assessments, audits, and inspections
53
Analyze critical issues for action
54
Develop plans of action
55
Specify success criteria
56
Remediation planning
57
Resource implications
58
Monitoring procedures
59
Software updates
Scope Attributes Vulnerabilities
60
Firmware updates
Scope Attributes Vulnerabilities
61
Software patches
62
Enterprise resources
63
Access control
64
Authentication systems
65
Remote access monitoring
66
Cybersecurity policies and procedures
67
Identity management
68
Authorization
69
Infrastructure/physical security
70
Physical security controls
71
User credentials