2.1 Explain the importance of security concepts in an enterprise environment Flashcards

1
Q

What is Configuration management in enterprise security?

A

Configuration management in enterprise security refers to the process of establishing and maintaining consistency of performance, functional, and physical attributes of systems, networks, or devices through controls, policies, and procedures to mitigate risks and ensure compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term describes the process of maintaining consistency of system attributes for security and compliance?

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Diagrams in enterprise security?

A

Diagrams in enterprise security refer to visual representations or blueprints that illustrate the architecture, design, components, and relationships of systems, networks, or infrastructure, aiding in understanding, communication, planning, and documentation of security controls and configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term describes visual representations illustrating the architecture and components of systems or networks?

A

Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Baseline configuration in enterprise security?

A

Baseline configuration in enterprise security refers to the standard or predefined settings, configurations, or states established for systems, networks, or applications as a reference point for security, performance, or compliance, serving as a foundation for monitoring, comparison, and deviation detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term describes the standard settings established as a reference point for system configurations?

A

Baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Standard naming conventions in enterprise security?

A

Standard naming conventions in enterprise security refer to established guidelines or rules for naming systems, files, users, or resources consistently and informatively, facilitating organization, management, and identification of assets, data, or entities within an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes established guidelines for naming resources consistently within an organization?

A

Standard naming conventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Internet protocol (IP) schema in enterprise security?

A

Internet protocol (IP) schema in enterprise security refers to the logical addressing structure and allocation of IP addresses within a network, defining the range, subnetting, hierarchy, or assignment methods to ensure efficient routing, communication, and management of network traffic and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term describes the logical addressing structure and allocation of IP addresses within a network?

A

Internet protocol (IP) schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Data sovereignty in enterprise security?

A

Data sovereignty in enterprise security refers to the concept and legal framework that determines the jurisdiction, ownership, control, and regulatory compliance requirements governing the storage, processing, or movement of data across geographical boundaries or regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term describes the concept determining the jurisdiction and regulatory requirements for data storage and processing?

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Data protection in enterprise security?

A

Data protection in enterprise security refers to the implementation of controls, technologies, and policies to safeguard sensitive or confidential information from unauthorized access, disclosure, alteration, or destruction, ensuring confidentiality, integrity, and availability of data assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What term describes the implementation of controls to safeguard sensitive information from unauthorized access?

A

Data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Data loss prevention (DLP) in enterprise security?

A

Data loss prevention (DLP) in enterprise security refers to the strategy, technologies, and processes designed to prevent, detect, and mitigate the unauthorized or inadvertent leakage, exfiltration, or exposure of sensitive data from within an organization, whether at rest, in transit, or in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term describes the strategy and technologies used to prevent unauthorized leakage of sensitive data?

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Masking in enterprise security?

A

Masking in enterprise security refers to the technique of concealing or obfuscating sensitive or confidential data by replacing or obscuring certain characters or portions of the information, preserving its format and usability while preventing unauthorized access or disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What term describes the technique of concealing sensitive information by replacing or obscuring certain characters?

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Encryption at rest in an enterprise environment?

A

Encryption at rest in an enterprise environment refers to the encryption of data while it is stored or persisted in databases, filesystems, or storage devices, ensuring that even if the storage media is compromised, the data remains unreadable and protected from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What term describes the encryption of data while it is stored in databases or storage devices?

A

Encryption at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Encryption in transit/motion in an enterprise environment?

A

Encryption in transit/motion in an enterprise environment refers to the encryption of data while it is being transmitted or communicated over networks or channels, protecting it from interception, eavesdropping, or tampering during transportation between endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What term describes the encryption of data during transmission over networks or channels?

A

Encryption in transit/motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Encryption in processing in an enterprise environment?

A

Encryption in processing in an enterprise environment refers to the encryption of data while it is being processed or manipulated by applications, systems, or services, ensuring that sensitive information remains protected and secure throughout the processing lifecycle.

24
Q

What term describes the encryption of data while it is being processed or manipulated by applications or systems?

A

Encryption in processing

25
Q

What is Tokenization in an enterprise environment?

A

Tokenization in an enterprise environment refers to the process of substituting sensitive data with non-sensitive placeholders or tokens, preserving its format and length, but eliminating its intrinsic value, reducing the risk of exposure or compromise while maintaining usability.

26
Q

What term describes the process of substituting sensitive data with non-sensitive tokens to reduce exposure?

A

Tokenization

27
Q

What is Rights management in an enterprise environment?

A

Rights management in an enterprise environment refers to the implementation of policies, controls, and technologies to manage and enforce access permissions, privileges, and usage rights of digital assets, ensuring compliance, confidentiality, and integrity across the information lifecycle.

28
Q

What term describes the management and enforcement of access permissions and usage rights of digital assets?

A

Rights management

29
Q

What are Geographical considerations in an enterprise environment?

A

Geographical considerations in an enterprise environment refer to factors such as regulatory requirements, data sovereignty laws, and geopolitical risks that influence the location, storage, processing, or transmission of data and infrastructure to ensure legal compliance and risk mitigation.

30
Q

What term describes factors such as regulatory requirements and data sovereignty laws influencing data handling?

A

Geographical considerations

31
Q

What are Response and recovery controls in an enterprise environment?

A

Response and recovery controls in an enterprise environment refer to measures, procedures, and technologies implemented to detect, contain, mitigate, and recover from security incidents or disruptions, ensuring business continuity, resilience, and minimal impact on operations.

32
Q

What term describes measures and procedures to detect, contain, and recover from security incidents?

A

Response and recovery controls

33
Q

What is SSL/TLS inspection in an enterprise environment?

A

SSL/TLS inspection in an enterprise environment refers to the process of decrypting and inspecting encrypted traffic to identify and prevent malicious activities, such as malware, intrusions, or data exfiltration, while maintaining privacy, security, and compliance with security policies.

34
Q

What term describes the process of decrypting and inspecting encrypted traffic for security analysis?

A

SSL/TLS inspection

35
Q

What is Hashing in an enterprise environment?

A

Hashing in an enterprise environment refers to the process of converting data or plaintext into a fixed-size hash value using cryptographic algorithms, ensuring data integrity, uniqueness, and non-repudiation, commonly used for password storage, digital signatures, or data verification.

36
Q

What term describes the process of converting data into a fixed-size hash value to ensure integrity and uniqueness?

A

Hashing

37
Q

What are API considerations in an enterprise environment?

A

API considerations in an enterprise environment refer to the factors, practices, and security controls applied to application programming interfaces (APIs) to ensure authentication, authorization, data protection, and secure communication between software components or services.

38
Q

What term describes the factors and security controls applied to APIs to ensure authentication and data protection?

A

API considerations

39
Q

What is a Hot site in the context of site resiliency?

A

A Hot site in the context of site resiliency is a fully operational backup facility equipped with necessary hardware, software, and data, ready to take over operations in the event of a disaster, offering minimal downtime and seamless continuity of critical services.

40
Q

What term describes a fully operational backup facility ready to take over operations in case of a disaster?

A

Hot site

41
Q

What is a Cold site in the context of site resiliency?

A

A Cold site in the context of site resiliency is a backup facility that lacks infrastructure, hardware, software, or data replication, requiring extensive setup and configuration before becoming operational in the event of a disaster, resulting in longer downtime and slower recovery.

42
Q

What term describes a backup facility lacking infrastructure, hardware, or data replication, requiring setup during a disaster?

A

Cold site

43
Q

What is a Warm site in the context of site resiliency?

A

A Warm site in the context of site resiliency is a backup facility with some pre-deployed infrastructure, hardware, or software, but not fully operational, requiring configuration and data synchronization to become active in the event of a disaster, offering intermediate recovery time objectives.

44
Q

What term describes a backup facility with partially deployed infrastructure, hardware, or software, needing configuration during a disaster?

A

Warm site

45
Q

What are Deception and disruption techniques in security?

A

Deception and disruption techniques in security involve the deployment of deceptive measures, such as honeypots, honeyfiles, or DNS sinkholes, to lure, detect, and disrupt attackers, diverting their attention, delaying their activities, or gathering intelligence to enhance security defenses.

46
Q

What term describes the use of deceptive measures to lure, detect, and disrupt attackers in security?

A

Deception and disruption

47
Q

What are Honeypots in security?

A

Honeypots in security are decoy systems or resources designed to mimic legitimate assets, services, or vulnerabilities, attracting and diverting attackers away from real targets, allowing organizations to monitor, analyze, and gather threat intelligence without risking actual systems.

48
Q

What term describes decoy systems used to divert and gather intelligence on attackers without risking real systems?

A

Honeypots

49
Q

What are Honeyfiles in security?

A

Honeyfiles in security are decoy files or documents containing fabricated or enticing information designed to lure and deceive attackers who attempt to access or interact with them, enabling organizations to detect and respond to unauthorized access or data exfiltration attempts.

50
Q

What term describes decoy files containing fabricated information to lure and deceive attackers attempting unauthorized access?

A

Honeyfiles

51
Q

What are Honeynets in security?

A

Honeynets in security are networks of interconnected honeypots or decoy systems deployed within an organization’s infrastructure or perimeter, simulating a realistic environment to attract, analyze, and mitigate sophisticated attacks, providing insights into attacker behavior and tactics.

52
Q

What term describes networks of interconnected honeypots used to simulate realistic environments for analyzing and mitigating attacks?

A

Honeynets

53
Q

What is Fake telemetry in security?

A

Fake telemetry in security refers to the generation and dissemination of false or misleading data, events, or alerts within an organization’s network or systems, intended to deceive and confuse attackers, leading them to make mistakes or reveal their presence, facilitating detection and response efforts.

54
Q

What term describes the creation and dissemination of false data or events to deceive attackers and aid in detection?

A

Fake telemetry

55
Q

What is a DNS sinkhole in security?

A

A DNS sinkhole in security is a DNS server configured to redirect or block malicious domain name resolution requests, effectively preventing communication with known malicious or suspicious domains, disrupting malware infections, and mitigating threats at the network level.

56
Q

What term describes a DNS server redirecting or blocking malicious domain requests to disrupt malware infections?

A

DNS sinkhole