2.1 Security Concepts in Enterprise Environments Flashcards

1
Q

Why is it important to keep up with configuration management?

A

Change is the only constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the configuration to which all devices on a network should be conforming to. Integrity measurements should be checked against this configuration.

A

Baseline config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data that resides in a country is subject to the laws of that country.

A

Data Sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of hiding some of the original data in order to protect sensitive data like PII. Usually only protected from view, data is still intact in storage.

A

Data masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of encoding information into unreadable data

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to describe data that is on a storage device, often encrypted and given appropriate permissions.

A

Data at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Description of data that it is being transmitted over a network. Less protection that data at rest

A

Data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describes data that is actively processing in a computer’s memory or CPU cache. Almost always decrypted at this state.

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This method is used to replace sensitive data with a benign placeholder. No encryption is involved.

A

Tokenization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does information rights management (IRM) designate?

A

How data is used

Restricts data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System used for stopping data leakages before attackers can get to them

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What areas can a DLP system be installed to prevent data leakage?

A

Endpoint (PC)

Network

Servers

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one of the largest geographical considerations when storing data in other states or in other countries?

A

Legal implications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 3 major goals of an Incident Response Plan?

A

Identify the attack

Contain the attack

Limit impact of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is being inspected when you are performing an SSL Inspection?

A

If the trusted certificate between the browser and the web server has been signed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: When a PC sends a hello message to a web server on a network with SSL inspection on the firewall, the SSL decrypter on the firewall does not send it’s own proxy hello message to the web server.

A

False

17
Q

Composed of a short string of letters and numbers, also known as a message digest

A

Hash

18
Q

True or false: It is possible to recover the original message from a message digest created using a hashing function.

A

False

19
Q

What is a major consideration to hashing when it comes to reapeat data?

A

Collisions are possible

20
Q

This interface is commonly used to perform mobile app processes such as login pages. Can be subject to on-path attacks involving replaying received commands, as well as injection.

A

Application Programming Interface (API)

21
Q

Type of firewall used to protect applications over the web. Often used to protect APIs

A

WAF - Web application firewall

22
Q

What are two important security areas to consider when implementing an API?

A

Authentication - limit access

Authorization - keep roles limited

23
Q

Recovery site:

• An exact replica
– Duplicate everything
• Stocked with hardware
– Constantly updated
– You buy two of everything
• Applications and software are constantly updated
– Automated replication
• Flip a switch and everything moves

A

Hot site

24
Q

Recovery site:

• No hardware
– Empty building
• No data
– Bring it with you
• No people
– Bus in your team

A

Cold Site

25
Q

Recovery site:

• Somewhere between cold and hot
– Just enough to get going
• Big room with rack space
– You bring the hardware
• Hardware is ready and waiting
– You bring the software and data

A

Warm site

26
Q

A trap intended to lure in bad guys and keep them trapped there.

A

Honeypot

27
Q

Term referring to a network of honeypots

A

Honeynets

28
Q

Files created on a network to intentionally lure in attackers. Acts as an alert when file is accessed.

A

Honeyfile

29
Q

This method of deception involves sending false information to a machine learning AI which makes malicious malware look benign.

A

Fake telemetry

30
Q

A DNS server that hands out incorrect IP addresses

Can be bad: attacker can redirect traffic to a malicious site

Can be good: detects devices trying to access a malicious IP and redirects them back into the network

A

DNS Sinkhole