Securing Hosts And Data Flashcards

(43 cards)

1
Q

Principle that states systems should be deployed with only the application, services, and protocols they need to meet their purpose

A

Least Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of OS that disappears when users turn off the computer

A

Non-persistent operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of OS that meets predetermined requirements with a heavy emphasis on authentication and authorization

A

Trusted Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The two important benefits that imaging provides

A
  • Secure Starting Point

- Reduced Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These two strategies include automation, scripting, and templates to help deploy systems securely, and keep them in a secure state

A

Resiliency and automation strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The three steps in baseline configuration

A
  • Initial baseline configuration
  • Integrity measurements for baseline deviation
  • Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This ensures that systems and applications stay up to date with current updates

A

Patch Management. Usually combined with NAC technologies to identified unpatched devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process used to control changes and modifications done on systems and applications.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process used to protect hosts to include mobile devices, workstations, and servers from unauthorized applications

A

Whitelisting & Blacklisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This technique refers to using an isolated area on a system to test software.

A

Sandboxing

Linux - chroot command or chroot jail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The secure staging environments used to create software

A

Development
Test
Staging
Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are associated with embedded systems and often have internal storage that might retain documents that they process.

A

Multi-Function Devices (MFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The difference between EMI and EMP

A

EMI - Electronic Magnetic Interference. Associated with powerlines, microwaves, motors

EMP - Electronic Magnetic Pulse. Associated with Military tech, ESD, and lightning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The difference between FDE and SED

A

Full Disk Encryption - Encrypts entire disk

Self Encrypting Device - Includes hardware and software to provide encryption to a drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The difference between BIOS and UEFI

A

BIOS - referred as firmware.

UEFI - Does the same as BIOS but it can boot from larger disk and its CPU-independent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption.

A

TPM - Trusted Platform Module. Supports Secure Boot & Attestation. Provides a hardware root of trust or known secure starting point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is similar to a TPM but it is added to a system to manage and securely store cryptographic keys

A

HSM - Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The three most common type of cloud based technologies used

A

SAAS - Software as a Service. Web services
PAAS - Platform as a Service - Software is managed by the CSP.
IAAS - Infrastructure as a Service - Software is managed by the customer.

19
Q

Which Cloud model leaves the majority of the security responsibility to the customer

20
Q

Which Cloud model leaves the least amount of security responsibility to the customer

21
Q

This cloud service provides security services and considered a subset of the software as a Service model

A

Security as a Service

22
Q

This is a software tool or service deployed between an organization’s network and the cloud provider to monitory traffic and enforce security policies.

A

CASP - Cloud Access Security Broker

23
Q

The four categories of cloud deployment models

A

Public
Private
Community
Hybrid

24
Q

The 5 common deployment models for mobile devices

A
Corporate owned
COPE - Corporate owned, personally enabled
BYOD - Bring Your Own Device
CYOD - Choose Your Own Device
VDI - Virtual Desktop Interface
25
This includes the technologies to manage mobile devices
MDM - Mobile Device Management
26
This is an MDM application that isolates storage data.
Storage Segmentation
27
This is an MDM application that ensures that the appropriate content is stored in the correct location or segmented storage
Content Management
28
An MDM concept that describes the use of cell virtualization to isolate and protect an application.
Containerization
29
Organization sometimes use GPS to create a virtual or geographical boundary
Geofencing
30
An MDM concept that uses multiple elements to authenticate a user and mobile device
Context-aware
31
This is the process of modifying an Android device to give the user full admin access
Rooting
32
The process of copying an application package in the application packet kit (APK) format to the device and then activating it
Sideloading
33
These cables allows you to connect just about any device to your mobile device
USB-OTG (On the Go)
34
Allows the internet connection of a device to be shared with other devices.
Tethering
35
Allows a device to connect without a wireless AP or wireless router
WI-FI Direct - Similar to an ad hoc network
36
What is the difference between WI-FI Direct and Ad-hoc
Wi-fi Direct - uses single radio hop as opposed multi-hop wireless communications
37
The name of a device that has a dedicated function and uses a computer system to perform that function
Imbedded System - Such as wearable tech, Home Automation, UAV, vehicles, and medical devices
38
This is a type of operating system that react to input within a specific time
RTOS - Real Time Operating System
39
What are the file system encryption technologies for Windows and Linux
Windows - EFS - Encrypting File System | Linux - GNU Privacy Guard
40
Linux: Read / Write / Execute are represented by what numbers
Read - 4 Write - 2 Execute - 1
41
What command is used in Linux to change permissions on files
chmod - changemode
42
What techniques do organizations use to stop information from being taken from their infrastructure
DLP - Data Loss Prevention
43
What is the term used to describe the unauthorized transfer of data outside an organization
Data Exfiltration