3.2 Securing Hosts & Applications Flashcards

1
Q

What vulnerability exists with anti-virus/malware software?

A

Relies on known code signatures to detect malware and attackers have figured out ways to bypass this detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Endpoint Detection & Response (EDR) and capabilities it provides

A
  1. Uses methods, other than signatures, such as actions to detect malware
  2. Uses lightweight AI to take actions, such as quarantining files, isolating system from network, or rolling back to a known good config to remedy/detect malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Data Loss Prevention (DLP) (2)

A
  1. Prevents sensitive information from being transported on or outside of the network
  2. Can run on a variety of end-points to provide a robust solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define NGFW (2)

A
  1. Next Generation Firewall, aka Application Layer Gateway, stateful
  2. Works at application layer to allow/deny specific applications or sub-features of applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define HIPS (2)

A
  1. Host-based Intrusion Prevention System
  2. Runs on OS to actively monitor and block malicious actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define HIDS - Host-based Intrusion Detection System

A

Secondary system that monitors log files for intrusions and can reconfigure host protection to block those

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 reasons to use Host-based Firewall

A
  1. Concept Layered Protection - Defense in Depth
  2. Has direct access to traffic before it is encrypted and sent over network
  3. Has access to monitor the operating system and detect issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protections does UEFI BIOS provide, relative to the BIOS software?

A

Uses manufacturer’s public key to prevent malicious BIOS updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4 steps of the UEFI Secure Boot Process

A
  1. Secure Boot Process
  2. Trusted Boot Process
  3. Measured Boot Process
  4. Boot Attestation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the secure boot process verify?

A

Verifies that the digital signature of the bootloader matches with the digital signature of the OS to ensure that the bootloader hasn’t been tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What 3 things are verified during the trusted boot process?

A
  1. Verifies the digital signature of the OS Kernel
  2. OS Kernel verifies boot and start-up files
  3. OS runs ELAM (early launch anti-malware) and verifies digital signatures of all drivers before loading them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What occurs during the measured boot process?

A

Generates a hash from all the files loaded in the secure and trusted boot processes that can be compared against the same hash that is stored in the TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is boot attestation? (2)

A
  1. Comparing a hash generated from all the files loaded during the boot process to a known good hash previously stored in the TPM
  2. Can be done locally or forwarded to a remote system to verify that the OS booted up is trusted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define hardware root of trust

A

Using physically installed hardware as the basis of trust in a system since unlike software, it can only be modified by physically accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TPM - Trusted Platform Module provides (3):

A
  1. hardware root of trust
  2. cryptographic functions
  3. secure storage of keys and other system info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the TPM password vulnerable to brute force attacks and why?

A

No, it has anti-brute force mechanisms that prevent these attacks

17
Q

Define tokenization, relative to database security

A

Provides database security, instead of storing sensitive information, like a credit card #, a token is stored. The token is temporary and discarded after being sent to the transaction entity to complete the purchase.

18
Q

Define how hashing can provide database security

A

Instead of storing the actual value in the database, a hash of the value is stored preventing compromise of the database revealing sensitive information

19
Q

Define how salt can be used to enhance database security

A

Salting hashed values stored in the database complicates brute-force attacks, such as preventing the use of rainbow table attacks

20
Q

Define fuzzing

A

Automated process to find input validation vulnerabilities in applications, can be used as part of QA or maliciously by an attacker

21
Q

Define secure cookies

A

Cookies that are flagged and only allowed to transmitted via HTTPS by the browser

22
Q

Define HTTP secure headers

A

Web servers can define restrictions of what is allowed in HTTP communications

23
Q

Define SED & OPAL

A
  1. Self-Encrypting Drive, drive with encryption built-in running as data is written
  2. Only use drives that meet the OPAL storage standards/specifications
24
Q

Define DNS sinkhole

A

Creating alternate DNS entries for known malicious sites to an internal server for monitoring and access prevention