Security Operations Flashcards

(22 cards)

1
Q

What are the three phases of a secure baseline?

A
  1. Establish
  2. Deployable
  3. Maintain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIS?

A

Center for internet security. It pros and organizations worldwide provide detailed road maps to set up security baselines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the STIG?

A

Security technical implementation guide. Security baselines set up by the dod..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SCAP? What does it do.

A

Security context automation protocol.
Provides a common language for vulnerabilities so they can be shared between security tools and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CIS-Cat?

A

Center for internet security config assessment tool. Gold standard automatic standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to harden mobile devices?

A
  1. Strong passwords
  2. Biometrics
  3. Encryption
  4. Patching.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to harden workstations?

A
  1. Firewalls
  2. Anti-virus
  3. Principal of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to harden switches?

A
  1. Replace defaults
  2. Strong passwords
  3. Close unused ports
  4. Use virtual lans
  5. Use secure shell
  6. Use acls
  7. Patch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to harden routers?

A
  1. Update defaults
  2. Firewall
  3. Disable remote management
  4. Only user ssh for access
  5. Patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to harden cloud?

A
  1. Access controls
  2. Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to harden servers?

A
  1. Patches
  2. Principal of least privilege
  3. Logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to harden industrial control systems (ICS)?

A
  1. Segmentation
  2. Use supervising control and data acquisition system (SCADA)
  3. Physical security
  4. Patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to harden IOT’s?

A
  1. Change defaults
  2. Strong authentication
  3. Updates
  4. Segmentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to harden WAN’s?

A
  1. Change default
  2. Modify ssid name
  3. Disable ssid broadcasting
  4. Use MAC filtering
  5. Use WPA3 encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 mdm deployment models?

A
  1. Bring your own (BYOO)
  2. Choose your own device (CYOO)
  3. Corporate owned, personally enabled (COPE)
17
Q

2 wireless connection methods?

A
  1. Wireless
  2. Bluetooth
18
Q

What are the 5 Wireless connection methods?

A
  1. Ad-hoc- 2 devices connected together without a wan. Like wi-fi direct
  2. Captive portal- controls access to a wan. Usually a web page.
  3. Wps- connect to wan by pushing a button. Wi-fi protected setup
  4. Pre-shared key
  5. Evil twin attack
19
Q

What is bluejacking?

A

Uses Bluetooth discoverable mode to send stuff to phone like phishing

20
Q

What is bluesnarfing?

A

Using Bluetooth t o get data from a phone.

21
Q

How to harden Bluetooth?

A
  1. Disable unused connections
  2. Use Bluetooth low energy (BLE)
  3. Keep in non discoverable mode
22
Q

What is nfc? And how to avoid skimmimg

A

Near field communications. Like contact less pay.

Put in aluminum