2.1 Flashcards

Explain the importance of security concepts in an enterprise environment.

1
Q

Refers to the process of systematically managing and controlling the settings, configurations, and changes to hardware, software, and network components within an IT environment.

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are commonly used in architectural specifications to communicate how the enterprise is configured.

A

Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A predetermined set of secure and standardized settings for hardware, software, and network components within an IT system.

A

Baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are established, consistent rules for naming files, devices, accounts, or other elements within an IT system.

A

Standard naming conventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

32-bit numbers divided into 4 sets of 8 bits. xxx.xxx.xxx.xxx, where x is between 0 and 255.

A

Internet protocol (IP) schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the concept that data is subject to the laws and regulations of the country in which it is located.

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The set of policies, procedures, tools, and architectures used to ensure proper control over the date in an enterprise.

A

Data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Serve to prevent sensitive data from leaving the network without notice.

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involves the hiding of data by substituting altered values.

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the use of sophisticated mathematical techniques to prevent persons with unauthorized access to data from actually reading the data.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data that is stored.

A

Data At rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data being moved from one system to another.

A

Data In transit/motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that is actively being used, either in a processor or other computational element.

A

Data In processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the use of a random value to take the place of a data element that has traceable meaning. A good example of this is the credit card approval process.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The systematic establishment of rules and order to the various rights that users can invoke over digital object. For example, at the file level, here is read, write, etc.

A

Rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The impact of physical location, jurisdictional boundaries, and regional factors on the security and privacy of digital information.

A

Geographical considerations

17
Q

The measures and strategies implemented to address and recover from security incidents.

A

Response and recovery controls

18
Q

Is a cybersecurity practice that involves inspecting and monitoring encrypted SSL/TLS traffic to ensure security and compliance.

A

Secure Sockets Layer (SSL)/Transport
Layer Security (TLS) inspection

18
Q

Is a technology whereby the uniqueness of a data element can be represented in a fixed-length string.

A

Hashing

19
Q

____________ play a crucial role in enabling communication and data exchange between different software applications. Securing ___________ involves a comprehensive approach that includes strong authentication, encryption, input validation, monitoring, and adherence to security best practices throughout the _________ development and usage lifecycle. Regular assessments and staying informed about evolving security threats are essential in maintaining the security of _________ in dynamic technology environments.

A

Application Programming Interfaces (APIs)

20
Q

An organization’s ability to maintain critical business functions and cybersecurity capabilities in the face of disruptive events that could potentially impact the availability and integrity of its systems and data.

A

Site resiliency

21
Q

Is a fully configured environment, similar to the normal operating environment that can be operational immediately or within a few hours.

A

Hot site

22
Q

An environment that has the basic environmental controls necessary to operate but few of the computing components necessary for processing.

A

Cold site

23
Q

Is a partially configured environment, usually having the peripherals and software but perhaps not the more expensive main processing computer.

A

Warm site

24
Q

Are cybersecurity strategies used to enhance security measures and thwart cyber threats. Both approaches focus on confusing, misdirecting, or impeding attackers to protect systems and data.

A

Deception and disruption

25
Q

Is a server that is designed to act like a real server on a corporate network, but rather than having real data, it possesses fake data.

A

Honeypots

26
Q

Is a file that is designed to look like a real file on a server, but the data it possesses is fake.

A

Honeyfiles

27
Q

Is a collection of honeypots. It is a network designed to look like a corporate network but is made attractive to attackers.

A

Honeynets

28
Q

Is a synthetic network traffic that resembles genuine communications. delivered at an appropriate volume to make honeypots and honeynets look real.

A

Fake telemetry

29
Q

Is a DNS provider that returns specific DNS requests with false results.

A

DNS sinkhole