2.1 Explain the importance of security concepts in an enterprise environment Flashcards

1
Q

Configuration management
-Baseline configuration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuration management
-Diagrams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuration management
-Standard naming conventions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration management
-Internet protocol (IP) schema

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data sovereignty

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data protection
-Data loss prevention (DLP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data protection
-Masking

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data protection
-Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data protection
-At rest

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data protection
-In transit/motion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data protection
-In processing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data protection
-Tokenization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data protection
-Rights management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Geographical considerations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Response and recovery controls

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure sockets layer (SSL)/Transport layer security (TLS) inspection

A
17
Q

Hashing

A
18
Q

API considerations

A
19
Q

Site resiliency
-Hot site resiliency

A
20
Q

Site resiliency
-Cold site resiliency

A
21
Q

Site resiliency
-Warm site resiliency

A
22
Q

Deception and disruption
-Honeypots

A
23
Q

Deception and disruption
-Honeyfiles

A
24
Q

Deception and disruption
-Honeynets

A
25
Q

Deception and disruption
-Fake telemetry

A