Course 2 | Play It Safe_ Flashcards

play it safe_ (39 cards)

1
Q

What is security posture?

A

An organization’s ability to defend its data and assets and respond to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is business continuity?

A

The ability to keep operations running through disaster recovery planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is InfoSec?

A

A set of processes to secure information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of InfoSec design processes?

A

Incident response
Vulnerability management
Cloud security
Application security
Infrastructure security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of managing data in Security Architecture?

A

Using a SIEM tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are key principles used in security architecture?

A

Threat modeling
Least privilege
Failing securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of NIST’s Risk Management Framework?

A

To help organizations manage risk across systems through a structured 7-step process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens during the Prepare step of RMF?

A

Organizations get ready to manage risk before a breach occurs (planning, roles, context).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Categorize step do in RMF?

A

Defines how different types of information and systems should be protected based on impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Select step of the RMF about?

A

Choosing the best security controls to handle the identified risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the goal of the Implement step in RMF?

A

Putting selected security controls into place within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Assess step evaluate in RMF?

A

Whether the security controls are installed correctly and working as intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Authorize step mean in RMF?

A

Officially accepting the system’s risk level and approving its use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the Monitor step in RMF?

A

Continuously checking the system and its controls for ongoing risk or failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does risk acceptance mean in InfoSec?

A

Choosing to accept the risk as-in, often because reducing it would disrupt business or cost too much.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the ProxyLogon vulnerability affect?

A

Microsoft Exchange servers. It allows attackers to authenticate remotely and run malicious code.

17
Q

What does ZeroLogon target, and why is it dangerous?

A

Microsoft’s Netlogon protocol - it let’s attackers bypass authentication and take control of the system.

18
Q

What is Log4Shell and what does it let attackers do?

A

A flaw in Java logging; allows remote code execution and data leaks acorss internet-connected systems.

19
Q

What does PetitPotam target and how?

A

NTLM (Windows LAN Manager); it lets attackers on a local network fake an authentication request to steal credentials.

20
Q

What is server-side request forgery (SSRF)?

A

Tricking a server into accessing backend resources or leaking internal data.

21
Q

What is the purpose of the CISSP domains in InfoSec?

A

They organize core areas of information security to help professionals manage and protect systems.

22
Q

What does Security Architecture and Engineering involve?

A

Designing secure systems, applying controls like least priveledge, and using tools like SIEMs.

23
Q

What is encryption and how does it work?

A

Converts readable data (plaintext) into unreadable code (ciphertext) to prevent unauthorized access.

24
Q

What are biometrics used for in security?

A

To verify identity using unique personal features like fingerprints or facial recognition.

25
What is the Cyber Threat Framework?
A U.S. government standard for describing and communicating cyber threats using shared technology.
26
What is ISO/IEC 27001?
An international standard for managing information security, outlining best practices and required controls.
27
What is the NIST Cybersecurity Framework? (CSF)?
A flexible framework for managing cybersecurity risk through core functions.
28
What is the goal of OWASP's (Open Web Application Security Project) security principals?
To guide secure software development and reduce common vulnerabilities.
29
What are the six core functions of the NIST CSF?
1. Govern 2. Identify 3. Protect 4. Detect 5. Respond 6. Recover
30
What is a security audit?
A review of an organization's security controls, policies, and procedures against a standard or requirement.
31
What are the three main control categories in InfoSec?
1. Administrative 2. Technical 3. Physical
32
What does a server log track?
Events related to services like logins, emails, file shares - includes usernames and passwords used.
33
What is a SIEM (Security Information and Event Management) tool used for?
To collect, analyze, and monitor logs across systems for signs of threats or policy violations.
34
What are proprietary tools in cybersecurity?
Software that is owned and licensed by a company - usually pad and closed-source.
35
What is an OS (Operating System)?
The interface that connects computer hardware to the user, allowing interaction and control.
36
What is Linux and why is it used in cybersecurity?
An open-source OS that allows users to customize and control their systems often through a command-line interface.
37
What is Suricata?
An open-source network monitoring and threat detection tool maintained by the OISF.
38
What is a SOAR tool, and how is it different from a SIEM tool?
A SOAR (Security Orchestration, Automation, and Response) tool automates and coordinates incident response, often working with a SIEM.
39
What are the phases of incident response?
1. Preparation 2. Dectection and Analysis 3. Containment 4. Eradication and recovery 5. Post-incident activiy 6. Coordination