GCGA Ch. 5 Implementing Secure Systems (ST) Flashcards

(12 cards)

1
Q

Endpoints

A

computing devices such as servers, desktops, laptops, mobile devices, or Internet of Things (IoT) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EDR

A

Endpoint detection and response (EDR) provides continuous monitoring of endpoints. Extended detection and response (XDR) includes other types of devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening

A

the practice of making an operating system or application more secure from its default installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration management practices

A

help organizations deploy systems with secure configurations. A master image provides a secure starting point for systems. Master images are typically created with templates or other baselines to provide a secure starting point for systems. Integrity measurement tools detect when a system deviates from the baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patch management procedures

A

ensure operating systems, applications, and firmware are kept up to date with current patches. This ensures they are protected against known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change management policies

A

define the process for making changes and help reduce unintended outages from changes. An application allow list identifies authorized software but blocks all other software. An application block list blocks unauthorized software but allows other software to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Full disk encryption (FDE)

A

encrypts an entire disk. A selfencrypting drive (SED) has the encryption circuitry built into the drive.
TPM: A Trusted Platform Module (TPM) is a chip included with many desktops, laptops and some mobile devices, and it supports full disk encryption, a secure boot process, and supports remote attestation. TPMs have an encryption key burned into them and they provide a hardware root of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HSM

A

A hardware security module (HSM) is a removable or external device used for encryption. An HSM generates and stores RSA encryption keys and can be integrated with servers to provide hardware-based encryption. A microSD HSM is a microSD chip with an HSM device installed on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protecting confidentiality

A

The primary method of protecting the confidentiality of data is with encryption and strong access controls. File system security includes the use of encryption to encrypt files and folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Database encryption methods

A

You can encrypt individual columns in a database (such as credit card numbers), entire databases, individual files, entire disks, and removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP

A

Data loss prevention (DLP) techniques and technologies help prevent data loss. They can block transfer of data to USB devices and analyze outgoing data via email to detect unauthorized transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data exfiltration

A

the unauthorized transfer of data outside an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly