2.5 Flashcards

Segmentation and access control, mitigation techniques, hardening techniques

1
Q

True/False

Segmentation can help with performance as well as security

A

True

If there is an application that requires high bandwidth, you can put it on its own network segment. That way, the traffic of any other user on the same network will not interfere with the throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False

Segmentation makes change control more difficult

A

False

Segmentation makes change control much easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 ways that applications are identified by an allow list/deny list.

A

Application hash - only allow the application with this unique identifier

Digital certificate - only allow digitally signed apps from certain publishers

Path - only run applications in these folders

Network zone - only run apps from this network zone (private/public) - this can change as you physically change locations. If you’re in your private corporate network, the app works. If you’re in public, the app will not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False

Auto-update is always the best option

A

False

It’s always best, in an enterprise environment, to test patches first before deploying them to other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False

Some applications encrypt their own data, separate from the OS

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A check that makes sure you have the latest OS, applications are patched, virus signatures are updated, and configurations are secure.

This happens each time that a device logs into the network.

Also checks for certificate status, if your EDR are configured and turned on properly and the correct version, etc.

A

Posture assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when a system fails the posture assessment?

A

Quarantine into a private VLAN with limited access. Here, the system can implement the necessary changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the first, most vital step to hardening a system?

A

Download the security updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 3 things should you encrypt in order to harden a system?

A

Files
Full disk
Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EDR stands for

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A new age threat detection technology. It runs completely autonomously and is API driven. This is a LIGHTWEIGHT agent on the endpoint.

It can detect known-bad malware through signatures, but it can also conduct behavioral analysis, machine learning, and process monitoring (for new/different processes) to set baselines and detect when something malicious might be occurring.

After finding an anomaly, it conducts root cause analysis. Then, it immediately takes action: isolating the system, quarantining the threat, or rolling back to a previous backup/configuration.

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of firewall is ideal when hardening a network? It has a lot of granularity in controlling both the port number and the service that uses the port number.

A

NGFW (Next-Generation Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NGFW stands for

A

Next-Generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True/False

Applications can open ports without the user’s knowledge when installed

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nmap is a

A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly