Primary Definitions 19.0-22.0 Flashcards

(82 cards)

1
Q

Hardening

A

Process of enhancing the security of a system, application, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Functionality

A

A process of configuring a workstation or server with only essential applications and services for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Baseline Image

A

A standardized workstation setup, including OS, essential applications, and strict policies in corporate networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allowlisting

A

A security measure that permits only approved applications to run on an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blocklisting

A

Entails preventing listed applications from running, allowing all others to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Services

A

Background applications that operate within the OS, executing a range of tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted Operating System (TOS)

A

Designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evaluation Assurance Level (EAL)

A

Based on a set of predefined security standard and certification from the Common Criteria for Information Technology Security Evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SELinux (Security-Enhanced Linux)

A

Set of controls that are installed on top of another Linux distribution like CentOS or Red Hat Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hotfix

A

A software patch that solves a security issue and should be applied immediately after being tested in a lab environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service Pack

A

Includes all the hotfixes and updates since the release of the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Group Policy

A

Set of rules or policies that can be applied to a set of users or computer accounts within an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Template

A

A group of policies that can be loaded through one procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Context-based Permissions

A

Permission schemes that are defined by various properties for a given file or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extended Service Set (ESS) configuration

A

Involves multiple wireless access points working together to create a unified and extended coverage area for users in a large building or facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adjacent Channel Interference

A

Occurs when the channels selected for adjacent wireless access points do not have enough space between the channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Site Survey

A

Process of planning and designing a wireless network to provide a solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Heat Map

A

Graphical representation of the wireless coverage, the signal strength, and frequency utilization data a different locations on a map.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wi-Fi Protected Access 3 (WPA3)

A

Latest version using AES encryption and introducing new features like Simultaneous Authentication of Equals (SAE), Enhanced Open, updated cryptographic protocols, and management protection frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Simultaneous Authentication of Equals (SAE)

A

Enhances security by offering a key establishment protocol to guard against offline dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enhanced Open/Opportunistic Wireless Encryption (OWE)

A

Major advancement in wireless security, especially for networks using open authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Galois Counter Mode Protocol (GCMP)

A

Supports 128-bit AES for personal networks and 192-bit AES for enterprise networks with WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Management Protection Frames

A

Required to protect network from key recovery attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Remote Authentication Dial-In User Service (RADIUS)

A

Client/server protocol offering AAA services for network users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Terminal Access Controller Access-Control System Plus (TACACS+)
Separates the functions of AAA to allow for a more granular control over processes.
26
Extensible Authentication Protocol (EAP)
Authentication framework that supports multiple authentication methods.
27
Protected Extensible Authentication Protocol (PEAP)
Authentication protocol that secures EAP within an encrypted and authenticated TLS tunnel.
28
Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS)
Authentication protocol that extends TLS support across multiple platforms.
29
Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
Developed by Cisco, it enables secure re-authentication while roaming within a network without full authentication each time.
30
Application Security
Critical aspect of software development that focuses on building applications that are secure by design.
31
Static Code Analysis (SAST)
A method of debugging an application by reviewing and examining its source code before the program is ever run.
32
Dynamic Code Analysis (DAST)
Testing method that analyzes an application while it's running. This finds errors that won't show until the code is running.
33
Fuzzing
Finds software flaws by bombarding it with random data to trigger crashes and security vulnerabilities.
34
Stress Testing
Type of software testing that evaluates the stability and reliability of a system under extreme conditions.
35
Code Signing
Technique used to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since it was signed.
36
Sandboxing
Security mechanism that is used to isolate running programs by limiting the resources they can access and the changes they can make to a system.
37
Network Access Control (NAC)
Scans devices for their security status before granting network access, safeguarding against both known and unknown devices.
38
Web Filtering
Technique used to restrict or control the content a user can access on the Internet.
39
Agent-based Web Filtering
Installing a small piece of software known as an agent on each device that will require web filtering.
40
URL Scanning
Used to analyze a website's URL to determine if it is safe or not to access.
41
Content Categorization
Websites are categorized based on content, like social media, adult content, or gambling, which are frequently restricted in workplaces.
42
Block Rules
Specific guidelines set by an organization to prevent access to certain websites or categories of websites.
43
Reputation-based Filtering
Blocking or allowing websites based on their reputation score.
44
DNS Filtering
Technique used to block access to certain websites by preventing the translation of specific domain names to their corresponding IP addresses.
45
DomainKeys Identified Mail (DKIM)
Allows the receiver to check if the email was actually sent by the domain it claims to be sent from and if the content was tampered with during transit.
46
Sender Policy Framework (SPF)
Email authentication method designed to prevent forging sender addresses during email delivery.
47
Domain-based Message Authentication, Reporting, & Conformance (DMARC)
An email-validation system designed to detect and prevent email spoofing.
48
Email Gateway
Server or system that serves as the entry and exit point for emails.
49
Spam Filtering
Process of detecting unwanted and unsolicited emails and preventing them from reaching a user's email inbox.
50
Endpoint Detection and Response (EDR)
Category of security tools that monitor endpoint and network events and record the information in a central database.
51
File Integrity Monitoring (FIM)
Used to validate the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
52
Extended Detection and Response (XDR)
Security strategy that integrates multiple protection technologies into a single platform to improve detection accuracy and simplify the incident response process.
53
User Behavior Analytics (UBA)
Deploys big data and machine learning to analyze user behaviors for detecting security threats.
54
Identifying Vulnerabilities
Systematic practice of spotting and categorizing weaknesses in a system, network, or application that could potentially be exploited.
55
Vulnerability scanning
Automated method of probing networks, systems, and applications to discover potential vulnerabilities.
56
Threat Intelligence
Continual process used to understand the threats faced by an organization.
57
Open-Source Intelligence (OSINT)
Intelligence that is collected from publicly available sources including reports, forums, news articles, blogs, and social media posts.
58
Proprietary or Third-Party Feeds
Threat intelligence feeds that are provided by commercial vendors, usually under a subscription service type of business model.
59
Responsible Disclosure
Term used to describe the ethical practice where a security researcher discloses information about vulnerabilities in a software, hardware, or online service.
60
Common Vulnerabilities Exposure (CVE)
System that provides a standardized way to uniquely identify and reference known vulnerabilities in software and hardware.
61
Vulnerability Reporting
Process of documenting and communicating details about security weaknesses identified in software or systems to the individuals or organizations responsible for addressing the issue.
62
Responsible Disclosure Reporting
Art of disclosing vulnerabilities ethically and judiciously to the affected stakeholders before making the announcement to the public at large.
63
Log Aggregation
Process of collecting and consolidating log data from various sources into a centralized location.
64
Quarantining
Isolating a system, network, or application to prevent the spread of a threat and limit its potential impact.
65
Alert Tuning
Adjusting alert parameters to reduce errors, false positives, and to improve the overall relevance of the alerts being generated by a given system.
66
Simple Network Management Protocol (SNMP)
Internet protocol for collecting and organizing information about manage devices on IP networks and for modifying that information to change device behavior.
67
Management Information Base (MIB)
Used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers.
68
SIEM
Solution that provides real-time or near-real-time analysis of security alerts that are generated by network hardware and applications.
69
Data Loss Prevention Systems
Used to monitor and control data endpoints, network traffic, and data stored in the cloud to prevent potential data breaches from occurring.
70
Security Content Automation and Protocol (SCAP)
Open standards that automate vulnerability management, measurement, and policy compliance for systems in an organization.
71
Open Vulnerability and Assessment Language (OVAL)
XML schema for describing system security states and querying vulnerability reports and information.
72
Extensible Configuration Checklist Description Format (XCCDF)
XML schema for developing and auditing best-practice configuration checklists and rules.
73
Asset Reporting Format (ARF)
XML schema for expressing information about assets and the relationships between assets and reports.
74
Common Configuration Enumeration (CCE)
Scheme for provisioning secure configuration checks across multiple sources.
75
Common Platform Enumeration (CPE)
Scheme for identifying hardware devices, operating systems, and applications.
76
Common Vulnerability Scoring System (CVSS)
Used to provide a numerical score to reflect the severity of a given vulnerability.
77
Benchmark
Set of security configuration rules for some specific set of products to provide a detailed checklist that can be used to secure systems to a specific baseline.
78
Flow Analysis
Relies on a flow collector, which records metadata and statistics rather than recording each frame that passes through the network.
79
NetFlow
A Cisco-developed means of reporting network flow info to a structured database.
80
IP Flow Information Export (IPFIX)
Defines traffic flows based on shared packet characteristics.
81
Multi Router Traffic Grapher (MRTG)
Creates graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using SNMP.
82
Single Pane of Glass
A central point of access for all the information, tools, and systems.