3.2 Implement Host or Application Security Solutions Flashcards

1
Q

A method of enpoint threat protection that scales to meet the increasing number of threats these days.

A

Endpoint detection and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 steps to EDR?

A

Detect a threat

Investigate the threat

Respond to the threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint protection method that involves stopping the leakage of data before the attacker can get to it.

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A firewall capable of broad security controls that include allowing or blocking application features, identifing malware, examining encrypted data, and preventing access to URLs or URL categories.

A

Next-generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software based firewall that runs directly on the endpoint. Can allow or disallow application traffic.

A

host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a HIDS and a HIPS system?

A

HIDS - Host-based intrusion detection system

Used to detect intrusions

HIPS - Host-based intrusion prevention system

Used to block known attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two integrated hardware compnents that are the source of trust for a system when it comes to security?

A

Trusted platform module (TPM)

Hardware security module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Boot type that is part of the UEFI specification and verifies the bootloader on a system.

A

Secure boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boot version that verifies the digital signature of the OS kernel, and takes place just before loading the drivers.

A

Trusted Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called when a devices sends an encrypted and digitally signed report of the system’s secure boot information to an attestation server?

A

Remote attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 of the main compliance standards that often apply to database security?

A

PCI DSS

HIPAA

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of replacing sensitive information with a non-sensitive placeholder.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: In tokenization, the original data and the token are mathematically related, just like an encryption.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process of developing code which verifies that the data entered is correctly formatted to prevent attacks.

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of sending random input data to an application in order to test it’s robustness and input validation.

A

Dynamic analysis (fuzzing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: the process of fuzzing is processor and resource heavy.

A

True

17
Q

What protocol are secure cookies only transmitted over?

A

HTTPS

18
Q

In code signing, a developer signs their code with their own private key using asymmetric encryption. What must happen first before the developer can do the signing?

A

A trusted CA must sign the developers private key

19
Q

The process of testing applications using a static code analyzers to identify security flaws.

A

Static application security testing (SAST)

20
Q

Process of minimizing the attack surface of an application.

A

Hardening

21
Q

The process of encrypting a drive using hardware rather than encryption software like BitLocker.

A

Self-encrypting drive (SED)

22
Q

What are 4 ways to harden operating systems?

A

Updates

User account limitations

Network Access limitation

Monitor and secure (AV)

23
Q

Development method used to deploy and test software that prevents the application from accessing unrelated resources on the network.

A

Sandboxing

24
Q
A
25
Q

What are 4 ways to allow or deny applications via an operating system?

A

Hash

Certificate

File Path

Network Zone

26
Q

Standard for SED storage drives.

A

Opal Standard

27
Q
A