2.1 Flashcards

Explain the importance of security concepts in an enterprise environment. (30 cards)

1
Q

Refers to the process of systematically managing and controlling the settings, configurations, and changes to hardware, software, and network components within an IT environment.

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are commonly used in architectural specifications to communicate how the enterprise is configured.

A

Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A predetermined set of secure and standardized settings for hardware, software, and network components within an IT system.

A

Baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are established, consistent rules for naming files, devices, accounts, or other elements within an IT system.

A

Standard naming conventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

32-bit numbers divided into 4 sets of 8 bits. xxx.xxx.xxx.xxx, where x is between 0 and 255.

A

Internet protocol (IP) schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the concept that data is subject to the laws and regulations of the country in which it is located.

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The set of policies, procedures, tools, and architectures used to ensure proper control over the date in an enterprise.

A

Data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serve to prevent sensitive data from leaving the network without notice.

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involves the hiding of data by substituting altered values.

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the use of sophisticated mathematical techniques to prevent persons with unauthorized access to data from actually reading the data.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data that is stored.

A

Data At rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data being moved from one system to another.

A

Data In transit/motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that is actively being used, either in a processor or other computational element.

A

Data In processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the use of a random value to take the place of a data element that has traceable meaning. A good example of this is the credit card approval process.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The systematic establishment of rules and order to the various rights that users can invoke over digital object. For example, at the file level, here is read, write, etc.

A

Rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The impact of physical location, jurisdictional boundaries, and regional factors on the security and privacy of digital information.

A

Geographical considerations

17
Q

The measures and strategies implemented to address and recover from security incidents.

A

Response and recovery controls

18
Q

Is a cybersecurity practice that involves inspecting and monitoring encrypted SSL/TLS traffic to ensure security and compliance.

A

Secure Sockets Layer (SSL)/Transport
Layer Security (TLS) inspection

18
Q

Is a technology whereby the uniqueness of a data element can be represented in a fixed-length string.

19
Q

____________ play a crucial role in enabling communication and data exchange between different software applications. Securing ___________ involves a comprehensive approach that includes strong authentication, encryption, input validation, monitoring, and adherence to security best practices throughout the _________ development and usage lifecycle. Regular assessments and staying informed about evolving security threats are essential in maintaining the security of _________ in dynamic technology environments.

A

Application Programming Interfaces (APIs)

20
Q

An organization’s ability to maintain critical business functions and cybersecurity capabilities in the face of disruptive events that could potentially impact the availability and integrity of its systems and data.

A

Site resiliency

21
Q

Is a fully configured environment, similar to the normal operating environment that can be operational immediately or within a few hours.

22
Q

An environment that has the basic environmental controls necessary to operate but few of the computing components necessary for processing.

23
Q

Is a partially configured environment, usually having the peripherals and software but perhaps not the more expensive main processing computer.

24
Are cybersecurity strategies used to enhance security measures and thwart cyber threats. Both approaches focus on confusing, misdirecting, or impeding attackers to protect systems and data.
Deception and disruption
25
Is a server that is designed to act like a real server on a corporate network, but rather than having real data, it possesses fake data.
Honeypots
26
Is a file that is designed to look like a real file on a server, but the data it possesses is fake.
Honeyfiles
27
Is a collection of honeypots. It is a network designed to look like a corporate network but is made attractive to attackers.
Honeynets
28
Is a synthetic network traffic that resembles genuine communications. delivered at an appropriate volume to make honeypots and honeynets look real.
Fake telemetry
29
Is a DNS provider that returns specific DNS requests with false results.
DNS sinkhole