10 Flashcards

1
Q

Strategies for preventing intrusions:

A
  • White-lists
  • Patch vulnerabilities
  • Restrict privileges
  • Defense in depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process to avoid threats when building a system:

A
  • Assess risks
  • Secure underlying OS then apps
  • Secure critical content
  • Secure network
  • Maintain security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System security planning process:

A
  1. Purpose + Stored types of information + Applications/Services
  2. Categories of users + Privileges + Accessible types of information
  3. Authentication
  4. Administrator
  5. System information access
  6. System management (local/remote)
  7. Additional security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steps to hardening the OS:

A
  1. Install OS + last patches
  2. Configure OS
  3. Install + configure additional security controls
  4. Test OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Initial steps to setup an OS:

A
  1. Install OS
  2. Protect network
  3. Harden OS
  4. Install the minimum
  5. Secure boot
  6. Validate devices
  7. Install patches
  8. Test patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security maintenance includes:

A
  • Monitor logs
  • Backup
  • Recover
  • Test
  • Update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup:

A

Making copies of data regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Archive:

A

Keeping copies of data over a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Local exploit:

A

Software vulnerability exploited for elevated privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote exploit:

A

Software vulnerability in a network server triggered by a remote attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chroot jail:

A

Restriction on server’s view to just a specified directory (jail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User Account Control (UAC):

A

Controls that assure users use administrative rights only when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtualization:

A

Abstraction of resources used by software running in virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hypervisor:

A

Resource broker between hardware and VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hypervisor:

A

Resource broker between hardware and VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hypervisor functions:

A
  • Execute VMs
  • Emulate devices
  • Execute privileges
  • Manage VM lifecycle
  • Administrate platform and software
17
Q

Full virtualization variations:

A
  • Native
  • Hosted
18
Q

Software Defined Networks (SDNs):

A

Segments of the same physical network spanning multiple servers

19
Q

Virtualization security concerns:

A
  • Guest OS isolation
  • Hypervisor monitors guest OS
  • Virtualized environment security
20
Q

Virtual firewall:

A

Firewall for traffic between systems in the same virtualized environment