3.2 Given a scenario, implement host or application security solutions. Flashcards

1
Q

TPM

A

The Trusted Platform Module (TPM) is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption. A TPM keeps hard drives locked until proper authentication occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HSM

A

A Hardware Security Module (HSM) is a device used to generate, maintain, and store cryptographic keys. It is an external device and can easily be added to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIDS

A

A Host-based Intrusion Detection System (HIDS) can detect attacks on a host and protect critical files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIPS

A

Host intrusion prevention systems (HIPS) provide threat detection and prevent those threats based on signature values, heuristic behaviors, and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EDR

A

An endpoint detection and response (EDR) product provides real-time and historical visibility into the compromise, contains the malware, and facilitates remediation of the host to its original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Measured Boot

A

A trusted, or measured, boot process uses the trusted platform module (TPM) at each stage in the boot process to check hashes of key system state data, which then uses an attestation process to verify if the system has not been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fuzzing

A

Fuzzing is a dynamic analysis technique that checks code as it is running. When using fuzzing, the system is attacked with random data to check for code vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static analyzer

A

A static code analyzer examines code quality and effectiveness without executing the code. An analyzer can be used in conjunction with development for continued code quality checks, or once the code is in its finalization stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

A

A self-encrypting drive (SED) includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. SED requires credentials to be entered for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides encryption for a whole disk and protects the confidentiality of the data

A

Full disk encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

radio frequencies emitted by external sources, such as power lines that disturb signals. Can be avoided by shielding

A

Electromagnetic interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

combination of hardware and software used to adjust settings in a computer.

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UEFI

A

Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer’s firmware to its operating system. UEFI is the replacement for Basic Input/Output System (BIOS) and has many advancements to include provisions for secure booting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

process of checking and validating system files during a boot process.

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

A

hardware root of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

environment mimics that of production and allows for an environment to practice deployment

A

staging

17
Q

the final stage of the deployment effort. Testing in this environment would be too late, given it is the operational environment.

A

Production

18
Q

A place for creation. Requirements are turned into reality in this environment

A

development

19
Q

An isolated environment that is often used for testing. Security, patches, and critical updates can be tested.

A

sandbox

20
Q

Dynamic analysis

A

Inspects code as it is running for code quality and vulnerabilities.

21
Q

NIDS

A

Network Intrusion Detection System (NIDS) is an appliance at the network level.

22
Q

NIPS

A

Network Intrusion Prevention System (NIPS) is like a NIDS but uses intrusive means to protect the network.