2.1 Explain the Importance of security concepts in an enterprise environment Flashcards

1
Q

Helps ensure that systems are deployed in a secure and consistent state and that they stay in a secure and consistent state throughout their lifetime.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The initial implementation of a system under the standardized minimal level of security that all systems in an organization must comply with.

A

Baseline Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The concept that, once information has been converted into a binary form and stored as digital files, it is subject to the laws of the country within which the storage device resides.

A

Data Sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The collection of security measures intended to control access in order to optimize the protection of confidentiality, integrity and availability (CIA)

A

Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Systems specifically implemented to detect and prevent unauthorized access to, use of, or transmission of sensitive information.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The hiding of content when being displayed or printed.

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data States

A

At rest, in transit/ motion and in processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses unique identifying symbols / characters to represent sensitive data.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The governance of the permissions and privileges granted to users.

A

Rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to encrypt traffic between a web browser and web server.

A

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A dedicated device used to decode secure communications for the purpose of filtering and monitoring.

A

SSL/ TLS inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Providing a secondary location where a business can be moved and mission-critical business operations can be performed. The three levels of alternate sites are are: hot, warm, and cold.

A

Site resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A fictitious environment designed to fool attackers and intruders and lure them away from the private secured network.

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False work files that are used to tempt intruders or problematic insiders.

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two or more networked honeypots used in tandem to monitor or recreate larger, more diverse network arrangements.

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to trick an intruder or malicious code into thinking/ perceiving that an attack is occurring against a real target.

A

Fake Telemetry

17
Q

A false telemetry system which attempts to provide false responses to DNS queries from malware, such as bots.

A

DNS Sinkhole