4. Security Operations Flashcards

1
Q

4.1 Mobile device hardening

A

use strong authentication password, biometrics, regular updates, enable remote-wipe capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4.1 Hardening for workstations

A

Patch management, antivirus, access controls, firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4.1 Hardening for switches

A

Change default credentials, ACLs, Firmware updates, network segmentation, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.1 Hardening for routers

A

change default credentials, encrypted communication, firmware updates, disable unused services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4.1 Hardening for cloud infrastructure

A

IAM, conduct regular security audits, MFA, IRPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4.1 Hardening for Servers

A

Firewalls, disable unnecessary services, strong authentication methods, monitoring, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4.1 Hardening for ICS/SCADA

A

SCADA: Supervisory Control and Data Acquisition

ICS: Industrial Control Systems

Segment to isolated part of the network, regular patching, IDS, backup and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4.1 Hardening for Embedded Systems

A

They don’t get patch updates often. Install updates as soon as possible, network segmentation for these devices is encouraged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4.1 Hardening for IoT

A

Update regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4.1 Mobile Deployment Models and their hardening techniques

A

MDM: mobile device management, implement access controls and remote wipe

BYOD: use containerization to separate corporate and personal data, endpoint security, user training

COPE (corporate owned, personally enabled): Fully manage and control these devices, app installation management, data protection for corporate data, regular audits.

CYOD (choose your own device): Identify a list of pre-approved devices, apply baselines, implement access controls, regular updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4.1 Wireless Hardening

A

WPA3, AAA/RADIUS, Cryptographic Protocols, Authentication Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4.1 Authentication Protocols

A

RADIUS: centralized authentication, implement access control, maintain logs, encrypt RADIUS communications

Kereberos, OAuth2, SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4.1 Application Hardening

A

Input Validation, Secure Cookies (HTTPOnly flags), static code analysis, Code Signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4.2 Procurement considerations for hardware, software, and data

A

Hardware: Evaluate vendors, ensure compatibility and scalability

Software: Acquire licenses/subscriptions or create custom software solutions. Review licensing agreements.

Data: Acquire data sources, databases, and services to interact with databases. Ensure protection standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4.2 Assignment/Accounting considerations for hardware, software, and data

A

Hardware: track ownership with individuals and departments. Classify hardware based on function and lifecycle stage.

Software: Assign licenses, classify software based on purpose and criticality.

Data: classify data based on sensitivty, confidentiality, and regulatory requirements. Ensure access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4.2 Monitoring/Tracking considerations for hardware, software, and data

A

Hardware: up-to-date inventory, track asset locations, usage, and maintenance schedules.

Software: monitor usage and performance. track installations, updates, and patches. Ensure optimization.

Data: monitor data usage and access integrity. Track data flows and perform regular audits.

17
Q

4.2 Disposal considerations for hardware, software, and data.

A

Hardware: properly dispose, including sanitizing data and physicall destroying hardrives. Obtain certificate of destruction.

Software: Decommission software that is no longer needed. Revoke licenses as needed. Ensure no residual data or configurations remain on devices.

Data: Sanitize and securely delete.

18
Q

4.3 Application Vulnerability Management Techniques

A

Static Analysis
Dynamic Analysis
Package Monitoring

19
Q

4.4 SCAP

A

Security Content Automation Protocol. Standardizes the way security software communicates.

20
Q

4.4 Agent/Agentless tools

A

Agentless does not require installing a software.

21
Q

4.4 Signature-based vs. Heuristic-based antivirus

A

signature-based usually identifies previously known threats. Heuristic-based uses rulesets and pattern recognition to identify threats.

22
Q

4.4 NetFlow

A

Network protocol developed by Cisco for collecting IP traffic and analyzing traffic flow and unusual activity.

23
Q

4.5 Screened Subnet

A

AKA DMZ, used for public-facing applications. Establish proper firewall rules to allow specific traffic through.

24
Q

4.5 URL Scanning

A

A web filter should use URL scanning to inspect URLs before allowing users to access them or users to pass them to the application.

On-demand inspection: URL Scanning ocurs in real-time when a user enters a URL or clicks a link.

URL is checked against known databases.

25
4.5 Centralized Proxy
Forward and Reverse proxies are both types of centralized proxies. Centralized proxies are intermediaries between end users and the internet.
26
4.5 DNS Filter
Uses specialized DNS resolvers to compare queries against a blocklist of domains or IP addresses. Used to block broad categories of internet content. Prevents address resolution for these sites.
27
4.5 DLP
data loss prevention
28
4.5 NAC
Network Access Control. Allows policy enforcement for devices trying to connect to a network. Rules might include checking credentials (MAC Filtering), checking for up-to-date antivirus software, required configurations, etc.
29
4.5 DEMARC
Domain-based message authentication reporting and conformance. Only allows email traffic from approved domains. Checks SPF and DKIM records and reports occurrences to domain owners.
30
4.5 DKIM
DomainKeys Identified Mail, adds digital signatures to emails, making it possible to verify that an email came from a certain domain.
31
4.5 SPF
Sender Policy Framework. Email validation system, it is a published list of IP addresses that can send email on behalf of a domain.
32
4.5 EDR vs. EXR
EDR is classic endpoint protection and response. EXR is extended; it integrates data from multiple security tools such as network and cloud security.
33
4.6 SSO
Single Sign On. An authentication process that allows users to log in once and access multiple applications and services. LDAP, OAuth, SAML are examples
34
4.6 LDAP
Lightweight Directory Access Protocol. Manages directory information over a network and allows users to take advantage of SSO. OpenVPN, Docker, and Jenkins are all examples.
35
4.6 OAuth
Open Authorization. Standard protocol that allows third-party applications to obtain limited access to an HTTP service. Some examples are Google APIs, or other websites that allow you to create an account or login using a different service's credentials.
36
4.6 SAML
Security Assertion Markup Language. XML based standard for exchanging authentication data (web-based). Some examples are Office 365 and AWS. SAML is within a single entity such as Microsoft, unlike OAuth.
37
4.6 Password Vaulting, JIT Permissions, and Ephemeral Credentials
All used as privileged access management tools Password vaulting is like NordPass Just-in-time permissions is only granting access for a specific duration (think automatic login session timeouts on NSIPS) Ephemeral Credentials: Temporary authentication tokens, such as OTPs