1.0 Security Operations Flashcards
Windows Registry
System hardening
File structure
Configuration file locations
System process
Hardware architecture
Serverless
Virtualization
Containerization
On-premises
Cloud
Hybrid
Network segmentation
Zero trust
Secure access secure edge (SASE)
Software-defined networking (SDN)
Multifactor authentication (MFA)
Single sign-on (SSO)
Federation
Privileged access management (PAM)
Passwordless
Cloud access security broker (CASB)
Public key Infrastructure (PKI)
Secure sockets layer (SSL) inspection
Data loss prevention (DLP)
Personally Identifiable Information (PII)
Cardholder data (CHD)
Bandwidth consumption
Beaconing
Irregular peer-to-peer communication
Rogue devices on the network
Scans/sweeps
Unusual traffic spikes
Activity on unexpected ports
Processor consumption
Memory consumption
Drive capacity consumption
Unauthorized software
Malicious processes
Unauthorized changes
Unauthorized privileges
Data exfiltration
Abnormal OS process behavior
File system changes or anomalies
Registry changes or anomalies
Unauthorized scheduled tasks
Anomalous activity
Introduction of new accounts