Sec + 2 Flashcards
(38 cards)
1st stage of incident response
Preparation
What ensures that evidence has remained untouched?
Chain of custody
Primary concern of introducing automation and orchestration in security operations?
Complexity
What is it called when automation creates more problems than they solve?
Technical debt
Document outlining rights and responsibilities of users
Acceptable use policy
What is the max time a company tries to recover operations after a disaster?
Recovery time objective (RTO)
Formal agreement without legal obligations
MOU
What is it called when a company pays for insurance instead of new security controls?
Transfer
What is a written understanding with another entity detailing the sow without specifying how to do it?
Statement of work(SOW)
What agreement type defines service expectations and requirements?
Service-Level agreement(SLA)
Boundary when risk becomes unacceptable
Risk tolerance
Which external consideration primarily focuses on industry standards-based
Industry
What differentiates between data controller and data processor
Controller: determines the purpose and means of processing
What is it called when a company sends out simulated phising emails?
Campaigns
In the context of privacy, who is responsible for determining the purpose, condition, and means of processing personal data?
Controller
What threat is it when employees share office details outside of work?
Social engineering
What is attestation?
Formal declaration or confirmations
What is a UTM?
Unified threat management firewall.
Malware inspection
Data loss prevention (DLP)
Content and url filtering
Good for hiipa
What is ngfw?
Next generation firewall.
Layer 7
Uses advanced behavior analysis and behavioral monitoring.
What is the layer 4 firewall?
Stateless. Basic packet filtering.
What is RDP?
Remote desktop. Windows version of ssh.
What is tunneling?
Technique used to secure and encrypt traveling data with encryption. Uses ipsec
What is ipsec?
Protocols to encrypt data in transit. Used by vpns.
Ipsec process
- Authenticated header (AH) using sha-1 or md5 hashing
- Encapsulated security protocol (ESP) with des, 3des, or eas
- Internet key is used with dilfe- hellman