4 Security Applications and Device Flashcards
(39 cards)
Which operating system utilizes the PF and IPFW firewall
OS X
Which operating system utilizes the iptables firewall
Linux
What is a monitoring system that detects suspicious actives and generates alerts when they are detected
Intrusion Detection System (IDS)
What are the two types of IDS’s
Host-based IDS and Network-based IDS
What is a host based ids
it monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior
what is a network based ids
devices intelligently distributed within networks that passively inspect traffic traversing the devices on which they sit
What are the three types of detection methods in an IDS
signature based, policy based, and anomaly based
What is signature based detection method in an IDS
A specific string or byte triggers an alert
What is policy based detection method in an IDS
relies on specific declaration of the security policy
What is anomaly based detection method in an IDS
Analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average
What is malicious activity is identified as an attack:
A. True Positive
B. False Positive
C. True Negative
D. False Negative
A. True Positive
What is legitimate activity is identified as an attack
A. True Positive
B. False Positive
C. True Negative
D. False Negative
B. False Positive
What is legitimate activity is identified as legitimate traffic
A. True Positive
B. False Positive
C. True Negative
D. False Negative
C. True Negative
What is malicious activity identified as legitimate traffic
A. True Positive
B. False Positive
C. True Negative
D. False Negative
D. False Negative
What is the difference between an IDS and an IPS
An IDS detects and monitoring tools. Tools do not take action on their own. Requires human interaction. An IPS is a control system. They accept or rejects packets based on the ruleset. Require that the database gets updated regulated with new thread data.
What is a software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrence
Endpoint Data Loss Prevention System
What is software or hardware-based solution that is installed on the perimeter of the network to detect data in transit
Network Data Loss Prevention System
What is software installed on servers in the datacenter to inspect the data at rest
Storage Data Loss Prevention System
What is cloud software as a service that protects data being stored in cloud services
Cloud DLP System
What is the firmware interface that is similar to BIOS but stores its data in a file rather than on the firmware
UEFI
What are the ways to secure the BIOS
Flash the BIOS, use a BIOS password, configure the BIOS boot loader, disable external ports and devices, and enable the secure boot option
What type of storage device is connected directly to your organization’s network and often use RAID arrays to ensure high availability
Network Attached Storage (NAS)
What is a storage device that is network designed specifically to perform block storage functions that may consist of NAS devices
Storage Area Network (SAN)
What are some security characteristics with a Storage Area Network
Proper Data Encryption, Proper Authentication, and Log NAS access