3.2 Implement host or application security solutions Flashcards

1
Q

Endpoint protection
-Antivirus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Endpoint protection
-Anti-malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Endpoint protection
-Endpoint detection and response (EDR)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Endpoint protection
-DLP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Endpoint protection
-Next-generation firewall (NGFW)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoint protection
-Host-based intrusion prevention system (HIPS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Endpoint protection
-Host-based intrusion detection system (HIDS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Endpoint protection
-Host-based firewall

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boot integrity
-Boot security/Unified Extensible Firmware Interface (UEFI)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot integrity
-Measured boot

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Boot integrity
-Boot attestation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Database
-Tokenization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Database
-Salting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Database
-Hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application security
-Input validations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application security
-Secure validations

A
17
Q

Application security
-Hypertext Transfer Protocol (HTTP) headers

A
18
Q

Application security
-Code signing

A
19
Q

Application security
-Allow list

A
20
Q

Application security
-Block list/deny list

A
21
Q

Application security
-Secure coding practices

A
22
Q

Application security
-Static code analysis
-Manual code review

A
23
Q

Application security
-Dynamic code analysis

A
24
Q

Application security
-Fuzzing

A
25
Q

Hardening
-Open ports and services

A
26
Q

Hardening
-Registry

A
27
Q

Hardening
-Disk encryption

A
28
Q

Hardening
-OS

A
29
Q

Hardening
-Patch management
-Third-party

A
30
Q

Hardening
-Patch management
-Auto-update

A
31
Q

Self-encryption drive (SDE)/full-disk encryption (FDE)
-Opal

A
32
Q

Hardware root of trust

A
33
Q

Trusted Platform Module (TPM)

A