10.3 Flashcards

1
Q

This team is in charge of defensive security, implement controls, security monitoring, incident response,

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This team is in charge of improve overall security posture, and collaborative security

A

Purple team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The scanning tool – – – – – GUI version – – – – are designed to scan large networks quickly and provide information about a Netwerk and its host

A

Nmap and zenmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nmap began as a simple – – – – which is an application that searches advice for open ports indicating which insecure service might be used to craft an attack

A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This program developed by terrible security performs even more sophisticated vulnerability scans than a map among other things it can identify an encrypted, sensitive data saved on your networks host the program can run on your net work or from an offsite service continuously maintain an updated by the developer

A

NESSUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This popular penetration testing tool combines known scanning and exploit techniques to explore potential new attack routes

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This was formally known as a man trap hurry to confined space between two lock doors were one door much luck close before the other can open

A

Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This allows you controlled access to Quitman computers packages hardware in need of repair or even two written account credentials stored for emergency access

A

Smart locker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identifies physical penetration temperature extremes input voltage variations input frequency variations were certain kind of radiation

A

Tamper detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security device against Netwerk what software is supported attacks

A

Device hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of property management in applying security patches include the following

A

Discovery, standardization, defense in depth, vulnerability reporting, implementation, assessment, risk mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of account should only be used when those higher privileges are necessary to accomplish a task

A

Limited use account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Many companies require the privileged account to be accessed only on location so that no one not even legitimate network administrator can access the device remotely and make a high-level changes from the outside to protect the net worth

A

Limited location account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privilege account should be carefuly accounted for and disabled as soon as they are not needed

A

Limited duration accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The password for this account should be especially secure and difficult to crack

A

Limited access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privileged account can we use for destructive activity weather in malicious or not for this reason ever use your action in the couch should be loud and monitored by someone other than the owner of that account

A

Limited privacy account