2.1 Enterprise Security Concepts Flashcards

1
Q

What is the importance of configuration management and documentation?

A

Mainly to allow easy manual re-configuration of devices should there be a failure or catastrophe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the importance of network diagrams?

A

To know where devices are on the network and how they are physically connected to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the importance of baseline configurations? (2)

A
  1. ensure new equipment is configured correctly
  2. check to ensure that existing equipment is properly configured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the importance of standard naming conventions?

A

Standard naming conventions allow for easy identification of equipment, such as if the device is a router, switch, user workstation, etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the importance of an IP Schema? (2)

A
  1. Identifying physical location of an IP address
  2. Identifying type of equipment by IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define data sovereignty

A

Laws and regulations for data based on the location of the data, i.e. data collected on EU citizens must physically reside in the EU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is masking (relative to data)?

A

A technique to protect sensitive data, such as only display the last 4 numbers of a credit card and replacing the rest of the numbers with asterisks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data at rest and how can it be protected?

A

Data at rest is data that is stored on a storage device, such as SSD. Encryption and file/folder permissions can be used to protect this data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define data in transit/motion and how to protect it

A
  1. Data that is being transmitted across a network
  2. Encryption and network devices, such as a firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define data in-processing and how it is vulnerable

A

Data in-processing is data that is in the memory or other system caches. It is not encrypted and vulnerable if access is gained to those hardware resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is tokenization?

A

Replacing data with data different from the original data. For example, instead of transmitting credit card numbers, a token is transferred across the network that can be used to identify the credit number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is information rights management?

A

Protecting a document by only allowing certain actions based on the user. For example, denying copy/paste from a document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DLP?

A

Data-Loss Prevention, intelligent systems that inspect and identify sensitive information and prevent it from exfiltrating the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define response and recovery

A

Pre-determined and documented procedures need to be defined to follow in case of an attack or catastrophe to stop the threat and recover from the event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define SSL/TLS Inspection

A

A host or device that acts as a man-in-middle to decrypt and re-encrypt network traffic to allow monitoring/inspection of network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Importance of hashing in an enterprise environment - 3 uses

A

Using strong hashing, like SHA256, is important to:
1. protect passwords
2. create strong digital signatures
3. prevent encryption from being cracked via brute force

17
Q

API Security concerns

A

API traffic must be monitored, encrypted, and properly secured with permissions to limit access and actions using principle of least privilege

18
Q

Define Site Resiliency: Hot Site

A

An exact replica of the network at an alternate location; all data and configurations are kept in-sync with the live environment

19
Q

Define Site Resiliency: Cold Site

A

A site containing empty racks; all devices and data must be setup and restored from backups

20
Q

Define Site Resiliency: Warm Site

A

In-between a hot and cold site; has some equipment to get your network back up and running in a relatively short time frame

21
Q

Define Honeypot

A

A system or series of systems designed to look like a real environment to bait attackers and monitor what exploits are attempted against it

22
Q

Define Honeynet

A

Multiple honeypots designed to gather more intel on exploits attempted by threat actors

23
Q

Define Honeyfiles

A

Files to attract the attention of threat actors to determine what type of information they are interested in accessing, such as “passwords.txt”

24
Q

Define Fake Telemetry in relation to AI

A

Attackers feeding data to AI during its learning phase in order to alter its behavior, such as a specific malware program that the AI learns to identify as a good program

25
Q

Define DNS Sinkhole

A

A DNS server that provides responses to direct traffic to alternate websites, instead of the valid website. Can be used by attackers or by IT Security to monitor users attempted access to known malicious sites