3.2 Flashcards

Given a scenario, implement host or application security solutions.

1
Q

Is the concept of extending the security perimeter to the devices that are connected to the network.

A

Endpoint protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are integrated solutions that combine individual endpoint security functions into a complete package.

A

Endpoint detection
and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Serve to prevent sensitive data from leaving the network without notice.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Act by inspecting the actual traffic crossing the firewall-not just looking at the source and destination addresses and ports, but also at the actual content being sent.

A

Next-generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Act to detect undesired elements in network traffic to and from the host.

A

Host-based intrusion detection
system (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is a HIDS with additional components to permit it to respond automatically to a threat condition.

A

Host-based intrusion prevention
system (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Also referred to as personal firewalls. Are host-based protective mechanisms that monitor and control traffic passing in to and out of a single system.

A

Host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The assurance that the boot process of a computer system has not been compromised or tampered with by unauthorized entities.

A

Boot integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Offers a solution to the [problem of boot integrity, called called Secure Boot, which is a mode that, when enabled, only allows signed drivers and OS loaders to be invoked.

A

Boot security/Unified Extensible
Firmware Interface (UEFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a security feature designed to enhance the integrity of the boot process in computer systems. It works by processing hashes and comparing the hash values to known good values.

A

Measured boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a security mechanism used to verify the integrity of a computing platform’s boot process remotely. It involves generating and providing evidence to remote parties about the trustworthiness of the platform’s boot sequence.

A

Boot attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the process of substituting a surrogate value, called a token, for a sensitive data element.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is the process of adding a random element to a value before performing a mathematical operation like hashing.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a mathematical method of reducing a data element to a short form that is not reversible to the original form.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is when code is examined without being executed.

A

Static code analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is analysis that is performed when the software is executed.

A

Dynamic code analysis

15
Q

Is a brute force method of addressing input validation issues and vulnerabilities. The basis for ____________ a program is the application of large numbers of inputs to determine which inputs cause faults and which ones might be vulnerable to exploitation.

A

Fuzzing

16
Q

Are methods of implementing cryptographic protection on hard drives and other similar storage media with the express purpose of protecting the data, even if the drive is removed from the machine. Are software only proprietary solutions.

A

Self-encrypting drive (SED)/
full-disk encryption (FDE)

17
Q

Is used for applying hardware-based encryption to storage mediums.

A

Opal

18
Q

Is the concept that if one has trust in a source’s specific security functions, this layer can be used to promote security to higher layers of a system.

A

Hardware root of trust

19
Q

Is a hardware solution on the motherboard, one that assists with key generation and storage as well as random number generation.

A

Trusted Platform Module (TPM)

20
Q

Refers to the quarantine or isolation of a system from its surroundings.

A

Sandboxing