1.0 Flashcards

1
Q

Agentless protection

A

Has a central security server or application that monitors all devices on the network to enforce security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOAR

A

Automates tasks related to detecting and remediating exploits. IE: It can delete or quarantine a malicious file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run Book automation

A

Compiled procedures or task that can guide you or complete tasks for you via scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sliding window anomaly detection

A

Detects anomalies in real time and denies the associated packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary access control

A

(DAC) The owner decides permissions of the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat intelligence platform (TIP)

A

Platform that allows you to generate and collect data from many different places to assist in defending and remediating against malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk scoring vs Risk assessment

A

Risk assessment is to weigh the likelihood and the impact of a potential attack, risk scoring is giving that a score (usually red, yellow, or green) to compare it to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense-in-Depth

A

Implement security on all different layers.
1. physical with Multi-Factor Authentication(MFA).
2. technical controls such as VLANs or port control.
3. Administrative with policies such as limiting junior personals privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application security systems

A

Protects layer 5-7, found on device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory access control

A

The system automatically denies permission depending on the user and the sensitivity of the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nondiscretionary access control

A

Access based on different types of rules, such as IT, Security, and user groups and gives access to said groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule-based access control

A

Sets a rule for a file, such as you can only view the file or that you cannot delete it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Role-based access control

A

Sales team can access sales files and IT can access IT files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVSS terms:
Attack Vector
Attack complexity
Privileges required
User interaction
scope

A

Common Vulnerability Scoring System higher scores are more dangerous (10 is the highest)
Attack Vector: what it targets such as the network, physical or the system.
Attack complexity: how hard/how much information the need before executing
Privileges required: What level of privilege does the require in need to execute the exploitation.
User interaction: Does the attacker need any user interaction?
Scope: What other systems are affected if a system gets compromised?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly