4.1-4.4 Flashcards

(30 cards)

1
Q

3 steps of secure baselines

A

establish
deploy
maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

mdm

A

mobile device management. used to mannage company owned mobile devices. set policies on apps,data, control the remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COPE

A

Corporate ownerd, personally enabled. company buys the device, used as both a corporate and personal. full control belongs to organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CYOD

A

Choose your own device.
Like COPE but user chooses the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wpa3 , psk authentication process

A

USES SAE to create pmk
creates a shared session key that doesn’t need to be sent across network. no fourway handshake no hash no brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAE

A

SAE-everyone uses the same psk with a different session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA framework

A

authentication authorization accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

radius

A

common aaa protocol, centralizes authentication. remote vpn access. server authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

input validation

A

check and correct all input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAST

A

Static Application Security Testing. Help to identify security flaws in code. Not always accurate so needs verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

app monitoring

A

watch for blocked injection attempts, app usage, unusual file transfers, increase in client access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

enumeration

A

list all parts of an asset (cpu,memory,storage drive, keyboard,mouse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sanitization

A

system disposal or decommissioning, completely remove data. to destroy or to recycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

certification of destruction

A

certificate of destruction after device has been disposed of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data retention

A

backup your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

dynamic analysis(fuzzing)

A

send random input to an application, looking for something out of the ordinary. many diff types of fuzzing engines

17
Q

cta

A

cyber threat alliance. members allow specific threat intelligence. this is a information sharing organization

18
Q

prioritize vulnerabilities

A

not every vulnerability shares the same priority. some are critical some are not.

19
Q

cvss

A

common vulnerability scoring system 0-10

20
Q

exposure factor

A

loss of value of business activity if the vulnerability is exploited.

Example: a small ddos may limit access to a service. -50% exposure factor

21
Q

secure enclave

A

the tpm of a mobile device

22
Q

exception

A

not dealing with a vulnerability because it has low severity score. usually needs formal process to approve

23
Q

risk tolerance

A

the amount of risk acceptable to an organization

24
Q

reporting

A

ongoing checks for vulnerabilities

25
monitoring
26
archiving
access to data is critical,collecting older data and moving it to a protected location so that it can be retrieved if needed
27
alert tuning
a balancing act, prevent false positives and false neg
28
SCAP
Security content automation protocol. allows tools to identify and act on the same criteria. language for all tools to use basically
29
snmp
simple network management protocol uses mib managament information base that uses oid object identifiers to poll devices at fixed intervals over udp 161
30
snmp traps
over udp 162