Chapter 18 Flashcards

(54 cards)

1
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EDR

A

Endpoint Detection Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIDS

A

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HSTS

A

HTTP Strict Transport Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware is short for

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NGFW

A

Next Generation Fire Wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCR

A

Platform Configuration Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SDLM

A

Software Development Lifecycle Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SED

A

Self-Encrypting Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SP in Windows SP means

A

Service Pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TPM

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UEFI

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UEM

A

Unified Endpoint Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UTM

A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A secure mechanism to verify the integrity of an IoT gateway during boot time.

A

Boot Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of HIDS?

A

To detect undesired elements in network traffic to and from the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of a HIPS?

A

To detect undesired elements in network traffic but also protect the network from the malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Served to prevent sensitive data from leaving the network without notice.

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ensures that a device boots using only software that is trusted by the Original Equipment Manufacturer.

23
Q

Process of adding random strings of characters to passwords in a database or each password before they are hashed to make them more secure.

24
Q

A software application made by Microsoft used to scan, detect, and remove viruses, spyware, and malware.

A

Windows Defender

25
A free open source utility for network discovery and security auditing.
NMap.
26
An open source GUI which aims to make NMap easier for beginners.
ZenMap
27
Services are accessed using what two ports?
TCP and UDP
28
Small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device.
Cookie
29
A physical or embedded security technology that resides on a computer's motherboard or processor.
TPM (Trusted Platform Module)
30
The process of testing input received by an application for compliance against a standard defined within the application.
Input Validation
31
What are allow and deny lists?
An allow list is a list of approved applications. A block/deny list is a list of applications that should not be allowed to run.
32
A directive that declares browsers should only interact via HTTPS, never HTTP, with a max time of 3600 seconds.
HSTS [HTTP Strict Transport Security]
33
What is the purpose of input validation?
To validate data input by the user, and repeat the request for the data in the case where input of the user is not valid.
34
A source that can always be trusted within a cryptographic system.
Hardware Root of Trust
35
Hardware based standard that is used for applying hardware-based encryption to mass storage devices.
Opal
36
What is the challenge in allow listing?
The number of potential applications that are run on a typical machine.
37
What host-based firewall is included in Windows OS?
Windows Defender Firewall
38
A physical device that connects to a computer network and exchanges data or commands with other devices.
Endpoint
39
The quarantine or isolation of a system from its surroundings.
Sandboxing
40
Two other server operating systems other than Windows.
Linux and VM/Hypervisor
41
What's the purpose of hotfixes, patching, and service packs?
To make sure the software and hardware of a system is up to date on the latest updates to better keep them secured and working efficiently.
42
What are FDE and SDE?
Methods of implementing encryption on hard drives.
43
What is the difference between Heuristic-scanning and signature-scanning?
Heuristic scanning looks for specific commands or instructions that would not typically be found in an application, signature scanning uses a virus dictionary to look for malware and viruses.
44
What is the purpose of a security appliance?
To keep a system protected from malicious activity.
45
Why does encryption and obfuscation pose problems for anti-malware?
If a virus or malware is encrypted then the antimalware won't be able to find it in its signature dictionary.
46
What code has weaknesses and vulnerabilities?
All code.
47
How Root of Trust applies to UEFI
To ensure that a known, certified boot loader is used to load the next stage loader/manager or O/S kernel.
48
Why would a security specialist run Netstat?
To have a statistics of all active connections in a system, making it easier to monitor and identify problems.
49
A repository of all information related to configurations.
Registry
50
What are hive keys?
Keys use to access the registry.
51
In what three ways can antimalware resolve malware issues?
Quarantine, Remove, and block.
52
How often are new security advisories released?
Once a week, every monday.
53
What does high-level software mean?
Applications close to user level.
54
What is MITRE and OWASP?
Websites that list all known software exploits and vulnerabilities.