3.2 host or application security solutions Flashcards

1
Q

EDR

A

Endpoint Detection and Response

a system that monitors and analyzes security threat information from endpoints and computer workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLP

A

data loss prevention

detects and prevents data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NGFW

A

next generation firewall

more powerful than traditional firewalls and have additional features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIDS

A

host based intrusion detection system
uses log files to identify intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIPS

A

host based intrusion prevention system
block known attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TPM

A

trusted platform module

computer chip

enforce software licenses, store passwords, certificates or encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ELAM

A

Early launch anti-malware (ELAM)provides protection for the computers in your network when they start up and before third-party drivers initialize.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fuzzing

A

a quality assurance technique that detects security vulnerabilities and coding errors in software, operating systems, and networks.

It involves sending a large amount of random data, called fuzz, to the test subject to make it crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

static analysis

A

Static code analysis is the process of analyzing code without running it.

It can detect errors, bugs, security flaws, and quality issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hardening

A
  • Open ports and services
  • Registry
  • Disk encryption
  • OS
  • Patch management
  • Third-party updates
  • Auto-update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SED

A

self encrypting drive
hardware based full disk encryption
opal - SED standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measured Boot

A

protects your machine from rootkits and other malware. Measured Boot will check each start up component including the firmware all the way to the boot drivers and it will store this information in what is called a Trusted Platform Module (TPM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

dynamic code analysis

A

Dynamic code analysis is the process of analyzing code while it is running. It can measure performance, behavior, code functionality, memory leaks, and resource consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Opal

A

a set of specifications for self-encrypting drives (SEDs)

OPAL Security is a hardware-based encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trusted Boot

A

In the kernel | OS validation | hardware, firmware

Trusted Boot verifies the digital signature of the OS in the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Boot

A

In the UEFI | software validation

only allows validated programs to run when a computer starts up