Sec + 2 Flashcards

(38 cards)

1
Q

1st stage of incident response

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ensures that evidence has remained untouched?

A

Chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Primary concern of introducing automation and orchestration in security operations?

A

Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it called when automation creates more problems than they solve?

A

Technical debt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Document outlining rights and responsibilities of users

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the max time a company tries to recover operations after a disaster?

A

Recovery time objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Formal agreement without legal obligations

A

MOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when a company pays for insurance instead of new security controls?

A

Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a written understanding with another entity detailing the sow without specifying how to do it?

A

Statement of work(SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What agreement type defines service expectations and requirements?

A

Service-Level agreement(SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Boundary when risk becomes unacceptable

A

Risk tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which external consideration primarily focuses on industry standards-based

A

Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What differentiates between data controller and data processor

A

Controller: determines the purpose and means of processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when a company sends out simulated phising emails?

A

Campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the context of privacy, who is responsible for determining the purpose, condition, and means of processing personal data?

A

Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What threat is it when employees share office details outside of work?

A

Social engineering

17
Q

What is attestation?

A

Formal declaration or confirmations

18
Q

What is a UTM?

A

Unified threat management firewall.
Malware inspection
Data loss prevention (DLP)
Content and url filtering
Good for hiipa

19
Q

What is ngfw?

A

Next generation firewall.
Layer 7
Uses advanced behavior analysis and behavioral monitoring.

20
Q

What is the layer 4 firewall?

A

Stateless. Basic packet filtering.

21
Q

What is RDP?

A

Remote desktop. Windows version of ssh.

22
Q

What is tunneling?

A

Technique used to secure and encrypt traveling data with encryption. Uses ipsec

23
Q

What is ipsec?

A

Protocols to encrypt data in transit. Used by vpns.

24
Q

Ipsec process

A
  1. Authenticated header (AH) using sha-1 or md5 hashing
  2. Encapsulated security protocol (ESP) with des, 3des, or eas
  3. Internet key is used with dilfe- hellman
25
Security policy is an example of?
Directive control
26
What is is called when an attacker tricks an employee into revealing their password by pretending to be from the it department?
Pretexting
27
What is a microservice?
Designing an app as a collection of loosely coupled, independently deployable services.
28
What is containerization?
An isolated app and its dependencies used to run and manage the app consistently across different os's.
29
What protocol is associated with port security and allows data access control over the data link layer?
802.1x
30
What is a network appliance that inspects traffic at both the transport and application layers and can make decisions based on both?
Next generation firewall (NGFW)
31
What is the common vulnerability enumeration(CVE)?
Provides a standard identifier for a known vulnerability.
32
What tool to use to detect unauthorized changes to system files?
File integrity monitoring apps.
33
What mechanism is used to streamline the access to a cloud app from the companies internal app?
Federation
34
What do agents do?
Get info from endpoints.
35
What is the primary advantage of standardized infrastructure configurations?
Enforcing baselines
36
How to preserve data?
Legal hold
37
What is continual oversight of a vendor?
Vendor monitoring
38
What document allows you to audit the other company?
Right to audit clause