Chapter 2.4 Flashcards

1
Q

HIPS

A

HIPS (Host Intrusion Prevention System) is software located on the host system and has an active response to threats. It can prevent events, such as system files being modified or block unauthorized remote network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HIDS

A

HIDS (Host Intrusion Detection System) is a type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system’s state. Key difference is to monitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIPS

A

NIPS (Network Intrusion Prevention System) is an appliance placed on the network to provide an active response to any network threats that matches its policies or signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

NIDS (Network Intrusion Detection System) is a system that uses passive hardware sensors to monitor traffic on a specific segment of the network. If there are any warnings, a log is generated, and a notification is sent out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SFC

A

SFC (System File Checker) is a Windows tool used to manually verify operating system (OS) files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SEP features

A

The virus and spyware protection feature of SEP (Symantec Endpoint Protection) is the commonly known anti-virus software that should be on every client image.

The proactive threat protection feature of SEP provides a behavioral approach to protecting the system against unknown threats. For example, a process utilizing high levels of CPU for a long time is a possible threat that will be stopped by the software eventually.

The network and host exploitation mitigation feature of SEP protects the system against exploits on the web, network, and any zero-day attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

process explorer

A

Process Explorer is part of Windows Sysinternals suite of tools. It can filter out the legitimate activity generated by normal operation of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WSUS

A

The WSUS (Windows Server Update Service) server is a central repository for updates related to OS and applications like Microsoft Office. Once downloaded locally, WSUS distributes the updates to the client computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

device instance ID

A

Information, like a vendor ID, product ID, or device instance ID, can be added to the “excluded drives” definition. Doing so will prevent all drives, except the specified USB IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Autoruns

A

The Autoruns tool, which is part of Windows Sysinternals, can help with hunting down malware on a computer.

The Autoruns’ ability to identify the startup services and their locations, can lead to researching ways to remove the malware and its rogue services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly