Wrong answers Flashcards

(103 cards)

1
Q

MTTR

A

Mean Time to Restore/Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mean Time to Restore (MTTR)

A

The amount of time required to get
back up and running. This is sometimes called Mean Time To Repair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPO

A

Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery Point Objective (RPO)

A

A recovered system may not be completely repaired, but it will be running well enough to maintain a certain level of
operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RTO

A

Recovery Time Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recovery Time Objective (RTO)

A

A GOAL of time to get back up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WAF

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Web Application Firewall (WAF)

A

Only allows a zip code in a zip code field. Prevents SQL injections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Processor

A

Performs an action with/to the data. Often a third party or small group within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Owner

A

an executive that is ultimately responsible for the use and security of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Controller

A

Manages the data. Often the human resources dept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Custodian

A

Responsible for the accuracy, privacy, and security of the data. Often IT dept or someone whose sole job is data custodian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTOS

A

Real Time Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Real Time Operating System (RTOS)

A

Needs to operate immediately, such as emergency breaking system in a vehicle or a military machine, device or function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Orchestration

A

Large-scale automation or automating processes between
different systems.
(completing the script of generating IT tickets to correct depts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Due diligence

A

The investigation performed on a third party prior to doing business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Role-based access controls

A

Used to associate a job function with a set of rights and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Device certificate

A

can be used to verify the ownership of a remote system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fail Over

A

When one system fails, an operational backup takes its place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewall

A

Firewall rules must be
built to match the traffic flows, and only then will traffic pass through the
firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HA (High Availability)

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UPS (Uninterruptable Power Supply)

A

Uninterruptable Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VPN concentrator

A

used as an endpoint to
an endpoint VPN solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ARO (Annualized Rate of Occurrence)
Annualized Rate of Occurrence
26
AV (Asset Value)
Asset Value
27
EF (Exposure Factor)
Exposure Factor, a percentage of asset lost
28
SLE (Single Loss Expectancy)
Single Loss Expectancy, dollar amount lost to a single event
29
ALE (Annualized Loss Expectancy)
Annual Loss Expectancy, dollar amount lost to all events in a year
30
WCF (Web Content Filtering)
Blocks malicious websites, inexpensive, easy to use
31
DNS Filtering (Domain Name System Filtering)
Blocks users from visiting malicious websites
32
802.1X
Authenticates user before user can gain access to the network- does not encrypt data in transit
33
WPA3
Authenticates user and encrypts data over the internet
34
RADIUS
Authenticates user credentials, any login page
35
Port 443
HTTPS secure encrypted
36
Port 80
HTTP not encrypted
37
SCAP (Security Content Automation Protocol)
Automates validation and patching of security issues
38
DSA (Digital Signature Algorithm)
Provides integrity, authentication, and non-repudiation. Opposite of encrypting information, sender sends with private key. Receiver verifies with public key.
39
SSH
Secure compared to Telenet
40
FTPS (Secure File Transfer Protocol)
Secure File Transfer Protocol
41
SSL/TLS
All the power of your browser with encryption from HTTPS Port 443
42
AES (Advanced Encryption Standard)
Advanced Encryption Standard, a symmetrical encryption
43
Passive Reconaissance
Searching social media etc
44
Active Reconnaissance
Penetration testing
45
DMARC
Specifies spam emails
46
SPF (Sender Policy Framework)
List of authorized/trust email senders
47
NAC (Network Access Control)
Only allowing authorized users with the help of EAP and IEEE 802.1X
48
DKIM
Validates digitally signed emails
49
Federation
Using a third party to log into a site, like using Google account to log into Pinterest
50
Journaling
Saves a copy as a middle man in case data goes down before getting posted
51
Resource Provisioning
Automated employee permissions related to onboarding/offboarding
52
Business Continuity
Plan B for when Plan A tech no workie
53
DNS Posioning
Attackers impersonating DNS to user by taking on IP address of DNS. Can also direct user to malicious websites
54
Enumeration
Documenting list of all parts in a device
55
IaC
Infrastructure as Code
56
AUP
Acceptable use Policy
57
SASE
Secure Access Service Edge- VPN for cloud services
58
NAT
Network Address Translation- assigning same IP address to a group of computers
59
UTM
all-in one device, expensive, router, IPS, firewall combined. can limit overall bandwidth
60
SCADA/ICS
network connecting large pieces of machinery in industrial environments, such as power plants, manufacturing, mining
61
VM Virtual Machines
Only share hardware resources
62
Containerized deployments
Share kernal operating systems, less secure than VM for this reason
63
DLP
Data Loss Prevention- could be in rest or in motion, blocking sensitive data in real time
64
Input validation
Input validation can be used to create a very specific filter of allowed input,
65
Static code analyzer
A static code analyzer is useful when evaluating the security of existing source code.
66
Secure cookies
Secure cookies ensure the information contained in the browser cookie is encrypted and only viewable by the end user.
67
Snapshot
Virtual machines (VMs) have a snapshot feature to capture both a full backup of the virtual system and incremental changes that occur over time. It’s common to take a snapshot of a VM for backup purposes or before making any significant changes to the VM.
68
Owner
The owner of an object controls access in a discretionary access control model.
69
Administrator
Administrators generally label objects when using mandatory access control, but they are not involved with discretionary access control.
70
OCSP (Online Certificate Status Protocol) Stapling
Stapling allows the certificate holder verify their own certificate status. The OCSP status is commonly “stapled” into the SSL/TLS handshake process. Instead of contacting the certificate authority to verify the certificate, the verification is included with the initial network connection to the server.
71
Wildcards
Wildcards are added to certificates for use across multiple devices associated with the same domain name.
72
Directory traversal
Directory traversal attempts to read or access files outside the scope of the web server's file directory. Look for a pair of dots in a file path (../)
73
LDAP (Lightweight Directory Access Protocol)
a common standard for authentication. LDAP is an open standard and is available across many different operating systems and devices.
74
DES and WEP
Older, weak encryption
75
Replay attack
A replay attack uses previously transmitted information to gain access to an application or service. This information is commonly captured in network PACKETS and replayed to the service.
76
SOW
A SOW (Statement of Work) is a detailed list of tasks, items, or processes to be completed by a third-party. The SOW lists the job scope, location, deliverables, and any other specifics associated with the agreement. The SOW is also used as a checklist to verify the job was completed properly by the service provider.
77
SLA
An SLA (Service Level Agreement) sets the minimum terms of service between a customer and a service provider. This agreement often contains terms for expected uptime, response time requirements,
78
BPA
A BPA (Business Partners Agreement) is used between entities going into business together.
79
MOU
A Memorandum of Understanding, states common goals, not legally binding
80
MOA
Memorandum of Agreement, next step above a MOU, both sides agree to objectives, sometimes legally binding, sometimes not
81
MSA
Master Service Agreement, legal contract, sets the terms, above MOU AND MOA
82
Air-gapped
An air-gapped network would be physically isolated from other networks. Air gapped networks are commonly used to separate networks that must never communicate to each other.
83
SD-WAN
An SD-WAN (Software Defined Networking in a Wide Area Network) network allows users to efficiently communicate directly to cloud-based applications
84
Jump server
A jump server is often used to allow external access to internal devices, commonly for maintenance or administrative tasks.
85
Non-repudiation
Non-repudiation is used to verify the source of data or a message. Digital signatures are commonly used for non-repudiation.
86
Containment
The containment phase isolates events which can quickly spread and get out of hand.
87
Eradication
Eradication focuses on removing the cause of the event and restoring the systems back to their non-compromised state.
88
would be the MOST effective use of asymmetric encryption?
Create a shared session key without sending the key across the network.
89
Data sanitization
Data sanitization involves the complete removal of data without any method of recovery.
90
data inventory
A data inventory describes a list of all data managed by an organization.
91
Metadata
Metadata is data which describes other data sources. Email header information, network headers,
92
Forward proxy/proxy server
A proxy server can be used to monitor incoming and outgoing network communication. Proxy servers can be used to identify malicious software, filter content, or increase performance through file caching
93
OSINT
OSINT (Open Source Intelligence) is information gathered from publicly available sources such as social media sites, online forums,
94
SCAP
SCAP (Security Content Automation Protocol) is a standard method used by security tools to identify and act on the same criteria.
95
Internal self-assessment
An internal self-assessment with audit can verify users have the correct permissions and all users meet the practice of least privilege.
96
Account de-provisioning
the disabling of an account and archiving of user information. This process usually occurs when an employee has left the organization.
97
VLAN
A VLAN (Virtual Local Area Network) is a logical method of segmenting traffic within network switches. Although this segmentation is effective, it’s not as secure as an air gap.
98
CYOD
CYOD (Choose Your Own Device) employer buys device
99
COPE
Corporately Owned, Personally Enabled devices are purchased by the company and deployed to the users.
100
BYOD
BYOD (Bring Your Own Device) is a model where the employee owns the mobile device but can also use the same device for work.
101
Router
Routers forward traffic between separate IP subnets or VLANs, and use the destination IP address to determine which interface on the router will be used
102
Proxy
Intercept all browser requests and cache the results
103