Section 3 Flashcards

1
Q

What are the 3 types of IDS detection?

A

Signature
Policy
Anomaly/Statistical (They are the labeled either)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of DLP?

A

Hardware and Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can DLP’s be placed?

A

On an endpoint
At the perimeter of the network
On the datacenter server
In the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a BIOS?

A

Basic Input Output System
It’s firmware (software on a chip)

Modern BIOS is UEFI but people still call it a BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do we secure the BIOS?

A
Flash the BIOS (Make sure its up to date)
Use a BIOS password
Configure the boot order
Disable external ports that aren't used
Enable secure boot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you ensure confidentiality on storage devices?

A

Encrypt the drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you protect from removable storage devices?

A

Use Removable Media Controls via group policy editor.
Also use administrative controls.
Use Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call a group of Network Attached Storage?

A

Storage Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you protect your NAS?

A

Use Encryption
Use Authentication for access
Log NAS access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of encryption? Give an example.

A

Hardware and Software

Hardware = Self encrypting drive or HSM
Software = FileVault in Mac, BitLocker in Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of encryption do FileVault and BitLocker use?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 Endpoint analysis tools?

A
Anti-Virus
Intrusion Detection Systems (HIDS/HIPS)
Endpoint Protection Platform (EPP)
Endpoint Detection Response (EDR)
User Entity Behavioral Analytics (UEBA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an EPP?

A

Software agent and monitoring. More focused on signature detection.

IDS/IPS
Firewall
DLP
File Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is EDR?

A

Software agent, collects system data, logs and monitors. Focused on behavioral analysis. Provides runtime and historical visibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is UEBA?

A

Automated identification of suspicious activity via user accounts or endpoints. Needs a lot of data to start working. Dependent on AI and ML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What encryption does WPA2/3 use?

A

AES

17
Q

What are the Public and Private IP Ranges?

A

A - 10.0.0.00 - 10.255.255.255
B - 172.16.0.0 - 172.31.255.255
C - 192.168.0.0 - 192.168.255.255