1.0 Security Operations Flashcards

1
Q

Windows Registry

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

System hardening

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File structure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Configuration file locations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System process

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware architecture

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Serverless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtualization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Containerization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On-premises

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hybrid

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network segmentation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero trust

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure access secure edge (SASE)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software-defined networking (SDN)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multifactor authentication (MFA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Single sign-on (SSO)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Federation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Privileged access management (PAM)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Passwordless

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cloud access security broker (CASB)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public key Infrastructure (PKI)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Secure sockets layer (SSL) inspection

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data loss prevention (DLP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Personally Identifiable Information (PII)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cardholder data (CHD)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Bandwidth consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Beaconing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Irregular peer-to-peer communication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Rogue devices on the network

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Scans/sweeps

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Unusual traffic spikes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Activity on unexpected ports

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Processor consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Memory consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Drive capacity consumption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Unauthorized software

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Malicious processes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Unauthorized changes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Unauthorized privileges

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Data exfiltration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Abnormal OS process behavior

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

File system changes or anomalies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Registry changes or anomalies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Unauthorized scheduled tasks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Anomalous activity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Introduction of new accounts

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Unexpected output

50
Q

Unexpected outbound communication

51
Q

Service interruption

52
Q

Application logs

53
Q

Social engineering attacks

54
Q

Obfuscated links

55
Q

Wireshark

56
Q

tcpdump

57
Q

Security information and event management (SIEM)

58
Q

Security orchestration, automation, and response (SOAR)

59
Q

Endpoint detection and response (EDR)

60
Q

Domain name service (DNS) and Internet Protocol (IP) reputation

61
Q

WHOIS

62
Q

AbuselPDB

63
Q

Strings

64
Q

VirusTotal

65
Q

Joe Sandbox

66
Q

Cuckoo Sandbox

67
Q

Command and control

68
Q

Interpreting suspicious commands

69
Q

Header

70
Q

Impersonation

71
Q

DomainKeys Identified Mail (DKIM)

72
Q

Domain-based Message Authentication, Reporting, and Conformance (DMARC)

73
Q

Sender Policy Framework (SPF)

74
Q

Embedded links

75
Q

Hashing

76
Q

Abnormal account activity

77
Q

Impossible travel

78
Q

JavaScript Object Notation (JSON)

79
Q

Extensible Markup Language (XML)

80
Q

Python

81
Q

PowerShell

82
Q

Shell script

83
Q

Regular expressions

84
Q

Advanced persistent threat (APT)

85
Q

Hactivists

86
Q

Organized crime

87
Q

Nation-state

88
Q

Script kiddie

89
Q

Insider threat-intentional

90
Q

Insider threat-unintentional

91
Q

Supply chain

92
Q

Timeliness

93
Q

Relevancy

94
Q

Accuracy

95
Q

Social media

96
Q

Blogs/forums

97
Q

Government bulletins

98
Q

Computer emergency response team (CERT)

99
Q

Cybersecurity incident response team (CSIRT)

100
Q

Deep/dark web

101
Q

Paid feeds

102
Q

Information sharing organizations

103
Q

Internal sources

104
Q

Incident response

105
Q

Vulnerability management

106
Q

Risk management

107
Q

Security engineering

108
Q

Detection and monitoring

109
Q

Indicators of Compromise (IoC)

110
Q

Configurations/misconfigurations

111
Q

Isolated networks

112
Q

Business-critical assets and processes

113
Q

Active defense

114
Q

Honeypot

115
Q

Repeatable/do not require human interaction

116
Q

Data enrichment

117
Q

Threat feed combination

118
Q

Minimize human engagement

119
Q

Application programming interface (API)

120
Q

Webhooks

121
Q

Plugins

122
Q

Single pane of glass