CySA+ Study Notes 13 Flashcards

(10 cards)

1
Q

??? is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). … ??? transactions use Extensible Markup Language (XML) for standardized communications between the identity provider and service providers.

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

??? messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP).

A

SOAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption etc. … Actively hides and protects cryptographic material.

A

HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

defends against software-based attacks aimed at stealing sensitive information by corrupting system or BIOS code, or modifying a platform’s configuration.

A

Trusted Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPU hardware-level isolation and memory encryption on every server, by isolating application code and data from anyone with privileges, and encrypting its memory. With additional software, ??? enable the encryption of both storage and network data for simple full stack security.

*** allows changes to users pc to be detected by authorized parties.

A

Secure Enclave / Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? technique used by cyber attackers to generate new domain names and IP addresses for malware’s command and control servers. Executed in a manner that seems random, it makes it nearly impossible for threat hunters to detect and contain the attack.

A

Domain Generation Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

special files that record significant events on your computer, such as when a user logs on to the computer or when a program encounters an error.

A

Event Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

block of text appended to the end of an email message often containing the sender’s name, address, phone number, disclaimer or other contact information …

A

Email Signature Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

??? is the process of adding additional information to your existing contacts for more complete data.

??? an ongoing stream of data related to potential or current threats to an organization’s security. … Sources of threat intelligence data include free indicator feeds, paid feeds, bulletins, internal intelligence gathering and strategic partnerships.

A

Data Enrichment / Threat Feed Combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a method for using specific standards to help organizations automate vulnerability management and policy compliance evaluation. ??? comprises numerous open security standards, as well as applications which use these standards to check systems for vulnerabilities and misconfigurations.

A

SCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly