4 Security Applications and Device Flashcards

1
Q

Which operating system utilizes the PF and IPFW firewall

A

OS X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which operating system utilizes the iptables firewall

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a monitoring system that detects suspicious actives and generates alerts when they are detected

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two types of IDS’s

A

Host-based IDS and Network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a host based ids

A

it monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a network based ids

A

devices intelligently distributed within networks that passively inspect traffic traversing the devices on which they sit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of detection methods in an IDS

A

signature based, policy based, and anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is signature based detection method in an IDS

A

A specific string or byte triggers an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is policy based detection method in an IDS

A

relies on specific declaration of the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is anomaly based detection method in an IDS

A

Analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malicious activity is identified as an attack:

A. True Positive
B. False Positive
C. True Negative
D. False Negative

A

A. True Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is legitimate activity is identified as an attack

A. True Positive
B. False Positive
C. True Negative
D. False Negative

A

B. False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is legitimate activity is identified as legitimate traffic

A. True Positive
B. False Positive
C. True Negative
D. False Negative

A

C. True Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is malicious activity identified as legitimate traffic

A. True Positive
B. False Positive
C. True Negative
D. False Negative

A

D. False Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between an IDS and an IPS

A

An IDS detects and monitoring tools. Tools do not take action on their own. Requires human interaction. An IPS is a control system. They accept or rejects packets based on the ruleset. Require that the database gets updated regulated with new thread data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrence

A

Endpoint Data Loss Prevention System

17
Q

What is software or hardware-based solution that is installed on the perimeter of the network to detect data in transit

A

Network Data Loss Prevention System

18
Q

What is software installed on servers in the datacenter to inspect the data at rest

A

Storage Data Loss Prevention System

19
Q

What is cloud software as a service that protects data being stored in cloud services

A

Cloud DLP System

20
Q

What is the firmware interface that is similar to BIOS but stores its data in a file rather than on the firmware

A

UEFI

21
Q

What are the ways to secure the BIOS

A

Flash the BIOS, use a BIOS password, configure the BIOS boot loader, disable external ports and devices, and enable the secure boot option

22
Q

What type of storage device is connected directly to your organization’s network and often use RAID arrays to ensure high availability

A

Network Attached Storage (NAS)

23
Q

What is a storage device that is network designed specifically to perform block storage functions that may consist of NAS devices

A

Storage Area Network (SAN)

24
Q

What are some security characteristics with a Storage Area Network

A

Proper Data Encryption, Proper Authentication, and Log NAS access

25
Q

What is a security limitation place on a system in regards to the utilization of USB storage devices and other removable data

A

removing media controls

26
Q

What is a type of disk encryption that is utilized by a storage device that performs whole disk encryption by using embedded software

A

Self-Encrypting Drive

27
Q

File Vault and BitLocker are the most commonly used ______ software

A

encryption

28
Q

What is a type of disk encryption that utilizes a chip residing on the motherboard that contains an encryption key

A

Trusted Platform Module (TPM)

29
Q

If your motherboard doesn’t have a Trusted Platform Module what is something you can use as a key

A

A usb drive

30
Q

What is a type of disk encryption that uses physical devices that act as a secure crypto-processor during the encryption process

A

Hardware Security Module (HSM)

31
Q

What is a type of encryption standard that utilizes a symmetric block cipher that can encrypt and decrypt information

A

Advanced Encryption Standard (AES)

32
Q

What is a type of IDS/IPS that monitors a computer system for unexpected behavior or drastic changes to the system’s state on an endpoint

A

Host-based IDS/IPS (HIDS or HIPS)

33
Q

What is a software agent and monitoring system that performs multiple security tasks such as anti-virus, HIDS/HIPS, firewall, DLP, and file encryption

A

Endpoint Protection Platform (EPP)

34
Q

What is a software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

A

Endpoint Detection and Response (EDR)

35
Q

What is a system that can provide automated identification of suspicious activity by user accounts and computer hosts

A

User and Entity Behavior Analytics (UEBA)

36
Q

What type of endpoint analysis is heavily dependent on artificial intelligence and machine learning

A

User and Entity Behavior Analytics (UEBA)

37
Q

What is the hybrid of EPP, EDR, and UEBA

A

NextGen AV (NGAV)

38
Q

What is the highest level of wireless security

A

WiFi Protected Access 2 (WPA2)

39
Q

What are some security attributes to do on mobile

A

Do not jailbreak