Section 4: Security Applications and Devices Flashcards

1
Q

What is the BIOS?

A

The Basic Input Output System (BIOS) is a type of firmware that is software on a chip. The systems way of deciding what it is going to accept as input and output.

For example: A motherboard talking to keyboard, graphics card, etc.

This is a legacy system, newer systems use UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the BIOS/UEFI load Order?

A
  1. Boot drive or device
  2. Load the machine
  3. Operating System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 steps of Securing the BIOS/UEFI?

A
  1. Flash/Update
  2. Password Protect
  3. Boot Order (Internal HDD and Network only)
  4. Disable External Ports not in use
  5. Enable Secure Boot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Secure Boot work?

A

Secure Boot loads the public key from the trusted platform module (TPM) in the processor and verifies it with the operating system to ensure it has not been modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Removable Media Controls? How can they be implemented?

A

Removable Media Controls are technical limitations placed on a system in regards to the utilization of usb storage devices.

They can be implemented by group policies such as blocking read or write access from usb or disk drive.

Administrative controls would be polices put in place as to how these devices are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a NAS storage system?

A

Network Attached Storage (NAS) is a storage device directly attached to an organizations network. Usually in RAID array for high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a SAN storage system?

A

Storage Area Network (SAN) is a network designed specifically to perform block storage functions that may consist of NAS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to secure Storage Devices? 3 steps?

A
  1. Data Encryption
  2. Proper Individual Level Authentication
  3. Log access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Encryption?

A

Encryption is the process of scrambling data into unreadable information that can only be unscrambled with a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Hardware Based Encryption and one example?

A

Hardware based encryption is the use of hardware to encrypt data on a system.

One example is a Self Encrypting Drive (SED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an SED for data?

A

Self Encrypting Drive (SED) is a storage device that performs whole disk encryption by using embedded hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Software Based encryption and two examples of it?

A

Software based encryption is an encryption process that uses the computers resources to encrypt information.

Two example are: FileVault on MacOS and BitLocker on Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is AES?

A

Advanced Encryption Standard (AES) is the symmetric key encryption that support 128-bit and 256-bit keys.

considered unbreakable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the downside of Whole Disk encryption?

A

Lower performance

Unless there are HSMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an HSM? Why are they not common?

A

Hardware Security Module (HSM) is a physical device that acts as a secure crypto-processor during the encryption process/Digital Singing.

They are not common because they are very expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Endpoints in security?

A

Endpoints are devices like computers, phones, etc used to connect to the network.

17
Q

Cybersecurity Analysts must be able to do what?

A

Cybersecurity Analysts must be able to use tools to identify behavioral anomalies and then identify the techniques used by malware to achieve privilege escalation and persistence on the host.

18
Q

Name the 5 Endpoint Security Capabilities?

A
  1. Anti-Virus (AV)
  2. Host Intrusion Detection/Prevention System (HIDS/HIPS)
  3. Endpoint Protection Platform (EPP)
  4. Endpoint Detection and Response (EDR)
  5. User and Entity Behavior Analytics (EUBA)
19
Q

What is Anti-Virus in relation to endpoint security?

A

Anti-Virus (AV) is software capable of detecting and removing viruses and other malware.

20
Q

What is HIDS/HIPS in relation to endpoint security?

A

Host-based Intrusion Detection or Prevention Systems (HIDS/HIPS) is a type of intrusion detection or prevention system for unexpected behaviors or drastic changes to systems state in an endpoint.

File system detection is a type of HIDS

21
Q

What is EPP in relation to endpoint security? What task can it do?

A

Endpoint Protection Platform (EPP) is a software agent and monitoring system that perform multiple security tasks such as AV, HIDS/HIPS, DLP, Firewall, File Encryption

22
Q

What is EDR in relation to endpoint security?

A

Endpoint Detection and Response (EDR) is a software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats. This is a behavioral detection system.

23
Q

What is UEBA in relation to endpoint security?

A

User and Entity Behavioral Analytics (UEBA) is a system that can provide automatic identification of suspicion activity by user accounts and compute hosts. This generally uses Artificial Intelligence and Machine Learning.

24
Q

What is ATP/AEP/NGAV in relation to endpoint security?

A

Advanced Threat or Endpoint Protection and NextGeneration AV are a mixture of the 5 Endpoint security capabilities.