Flashcards

(36 cards)

1
Q

Cloud-related threats

A

access control, data loss, insider threat mitigation (AUB), email security and malware protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is user access?

A

legit and malicious user activity while they are trying to access your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Suspected Bot Attack examples

A

User login from suspicious location; abnormal login pattern; multiple login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Abnormal Admin Activity example

A

Abnormal user activity while using your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware in Cloud Drive explanation

A

persistent and transient threats (malware and ransomware) at your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware activity (service threat)

A

A user uploads files that might be infected with a virus or other malwares to the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Suspicious Ransomware Activity

A

A user up-loads to the cloud service files that might be locked by a ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email Anti-phishing

A

Mitigates phishing emails sent to your cloud email services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Abnormal sender (email anti-phishing)

A

email sender tries to impersonate a legit or well-known sender or domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Suspicious embedded content (email anti-phishing)

A

email includes suspicious links, embedded content or attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware on Endpoint

A

Mitigates the risks associated with vulnerable and infected devices that are used to access your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UAC

A

User access control is a mandatory access control enforcement feature introduced w/ Microsoft Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 main domains

A

email, cloud applications, data, end point security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCPA (California Consumer Privacy Act)

A

aimed to enhance privacy rights and consumer protection for residents in the state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CCPA company criteria

A
  1. Gross annual revenue over $25M
  2. Annually purchases or receives for commercial purposes, or sells or shares for commercial purposes, personal information for 50,000 or more consumers, households, or devices in the state of California.
  3. Or generates 50 percent or more of their annual gross revenue from selling personal information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API

A

Automatic programming interface; allows applications to speak with each other

16
Q

Proxy server / proxy-based

A

intermediary server separating end-user clients from the destinations that they browse

17
Q

Honeypot

A

Fake something - typically WiFi

18
Q

Domain: Email - what is Coro protecting?

A

attachments, body, addresses, phishing, malware

19
Q

Domain: Data - what is Coro protecting?

A

Business data, Data integrity, DLP, Data in motion, Data at rest

20
Q

Domain: Cloud Apps - what is Coro protecting

A

O365, Gsuite, Dropbox, Slack, SF - Anomalous login/access, Malware, Ransomware, Insider threat protection/abnormal user behavior

21
Q

Domain: Endpoints - what is Coro protecting

A

Laptops, desktops, mobile, Wi-Fi phishing, vulnerability scanning, Anti-malware

22
Q

Coro Anti-malware

A

Powered by Bit-Defender

23
Q

Email phishing: what can Coro do?

A

Identify email address, display name, domain, analyze body of text

24
VPN
Virtual Private Network - extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
25
PCI
payment card industry/information
26
PII
Personal identifiable information
27
CASB
Cloud app security
28
Widget based approach
Add-on's to software platform
29
SIEM
Security Information Event Monitoring/management, aggregation and correlation of all devices
30
Types of PII
Name, alias, postal address, IP address, email address, bank account number, SSN, Drivers license, Passport
31
Darktrace - biggest difference
Biggest difference: pricing
32
PHI
protected health information
33
Geofencing
perimeter around device
34
BYOD
Bring your own device; we protect access to the data on those devices
35
spear phishing
hacker will target someone specifically