2.0 Protect Flashcards

1
Q

Data analytics

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intrusion prevention systems and tools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security vulnerability databases

A

CVE
CSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acceptable use policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network access control (NAC)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disaster recovery and business continuity plans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote work policies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active Directory Group Policy Objects (GPOs)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Footprinting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enumeration

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gaining access

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social-engineering

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Man-in-the-middle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Out-of-band

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DDoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Resource exhaustion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Forced system outage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packet generators

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Organizational structure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Internal teams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Personnel roles and responsibilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Communication policies and procedures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Knowledge sharing processes

30
Q

Conflict management

31
Q

Law enforcement

32
Q

Vendors

33
Q

Intrusion prevention systems (IPS)

34
Q

Intrusion detection systems (IDS)

35
Q

Firewalls

36
Q

Network segmentation

37
Q

Endpoint detection and response (EDR)

38
Q

least privilege

39
Q

Separation of duties

40
Q

Password enforcement policies

41
Q

Active Directory hygiene

42
Q

Patch management

43
Q

Mobile device management (MDM)

44
Q

Identify assets

45
Q

Cybersecurity polices and procedures

46
Q

Data security polices

47
Q

Cybersecurity auditing processes and procedures

48
Q

Audit objectives

49
Q

Network structure

50
Q

Compliance standard

51
Q

Document and communicate results

52
Q

Review assessments, audits, and inspections

53
Q

Analyze critical issues for action

54
Q

Develop plans of action

55
Q

Specify success criteria

56
Q

Remediation planning

57
Q

Resource implications

58
Q

Monitoring procedures

59
Q

Software updates

A

Scope
Attributes
Vulnerabilities

60
Q

Firmware updates

A

Scope
Attributes
Vulnerabilities

61
Q

Software patches

62
Q

Enterprise resources

63
Q

Access control

64
Q

Authentication systems

65
Q

Remote access monitoring

66
Q

Cybersecurity policies and procedures

67
Q

Identity management

68
Q

Authorization

69
Q

Infrastructure/physical security

70
Q

Physical security controls

71
Q

User credentials