3.2 Implement host or application security solutions Flashcards

1
Q

An essential security application and an example of a host-based IDS (HIDS). It provides both preventive and correction security controls. It monitors the local system for evidence of malware in memory, in active processes, and in storage.

A

Antivirus Software (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A more modern and all-inclusive term to replace antivirus. However, some claim that anti-malware will potentially detect a wider range of malicious code and potentially unwanted applications (PUA) than that of traditional AV.

A

Anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Seeks to detect, record, evaluate, and respond to suspicious activities and events, which may be caused by problematic software or by valid and invalid users.

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A unified threat management (UTM) device which is based on a traditional firewall with numerous other integrated network and security services, such as application filtering, deep packet inspection, intrusion prevention, TSL offloading and/or inspection, domain name and website filtering, QoS, bandwidth management, antimalware, authentication services, and identity management.

A

Next -Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Monitors the local system for malicious activity and attempted intrusions. Its purpose is to prevent attacks from becoming successful.

A

Host-Based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Monitors a local machine for symptoms of unwanted activity. Its purpose is to detect malicious activity or intrusions that have already taken place or that are still occurring on the monitored system.

A

Host-Based Intrusion Detection System (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security application that is installed on client systems. It provides protection for the local system from the activities of the user and from communications from the net-work or Internet.

A

Host-Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is protected using a range of mechanisms that attempt to prevent malicious manipulation of the boot files, firmware code, and device settings that are necessary to boot into a secure OS environment.

A

Boot Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides support for all of the same functions as BIOS with many improvements, such as support for larger hard drives (especially for booting), faster boot times, enhanced security features, and even the ability to use a mouse when making system changes. It also includes a CPU-independent architecture, a flexible pre-OS environment with networking support, measured boot, boot attestation (a.k.a. secure boot), and backward and forward compatibility.

A

Boot Security/ Unified Extensible Firmware Interface (UEFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An optional feature of UEFI that takes a hash calculation of every element involved in the booting process.

A

Measured Boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a feature of UEFI that aims to protect the local operating system by preventing the loading of or installing of device drivers or an operating system that is not signed by a preapproved digital certificate.

A

Boot Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A means to protect sensitive data, such as PII, by replacing it with a token that represents the sensitive data.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

.

A

Input Validations

17
Q

.

A

Secure Cookies

18
Q

.

A

Hypertext Transfer Protocol Headers

19
Q

.

A

Code Signing

20
Q

.

A

Allow List

21
Q

.

A

Block List/ Deny List

22
Q

.

A

Secure Coding Practices

23
Q

.

A

Static Code Analysis

24
Q

.

A

Manual Code Review

25
Q

.

A

Dynamic Code Analysis

26
Q

.

A

Fuzzing

27
Q

.

A

Hardening

28
Q

.

A

Patch Management

29
Q

.

A

Full=Disk Encryption (FDE) / Self=Encrypting Drive (SED)

30
Q

A SED standard defined by the Trusted Computing Group. Opal is based on the use of 128- or 256-bit AES and pre-decryption authentication.

A

Opal

31
Q

.

A

Hardware Root of Trust

32
Q

.

A

Trusted Platform Module (TPM)

33
Q

.

A

Sandboxing