3.2 Host and Application Security Flashcards

1
Q

Endpoint protection

A

Concept of extending the security perimeter to the devices that are connecting to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus/Anti-malware

A

Identify and neutralize viruses and malware

Uses signature-bases scanning to identify viruses from a signature library.

If not in the signature library it wont be found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Heuristic Scanning

A

Type of Scanning that doesn’t need signatures. It looks for odd Behaviors on the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EDR

A

Endpoint Detection and Response

A multi based detection tool that looks for other odd behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DLP

A

Data Loss Prevention

Endpoint DLP monitoring
Prevents sensitive data from leaving the net work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NGFW

A

Next-Generation Firewall

Inspecting actual traffic, the Content

Can Block a application, examine encryption data, prevent URLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HIDS

A

Host-Intrusion Detection system

Focuses of SPECFIC threats.
Only Detects
Software-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIPS

A

Host-based Intrusion Prevention System

Is like HIDS but actually dose something about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host-based firewall

A

Software based firewall
Allows end user to monitor and set security policies for incoming traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure Boot

A

Uses hardware such as:
TPM (trusted Platform Module)
HSM (Hardware security Module)

to ensure that the boot s free form tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic Ananlysis
(Fuzzing)

A

Brute force for input validations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Cookies

A

Has a secure attribute that tells the browser to send over HTTPS.

Cookies are automatically sent over plain text . That is why secure cookies are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP Secure Headers

A

Tells the browser to only communicate to HTTPS, never HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code Signing

A

Validates the application through digital signatures.

If the public key does not work then a prompt message will say its not a valid signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Allow list/Deny list

A

OS controls what can told what applications it can operate/download. Denies anything not listed on the allow list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Static code analyzers

A

Code is being examined without being executed.

17
Q

Dynamic Code Analysis

A

Preforming analysis while code is being executed.

18
Q

Registry

A

Contains configuration settings for the operating systems.

Compare what has been changed to identify vulnerabilities.

19
Q
A