4. Security Operations Flashcards

1
Q

4.1 Mobile device hardening

A

use strong authentication password, biometrics, regular updates, enable remote-wipe capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4.1 Hardening for workstations

A

Patch management, antivirus, access controls, firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4.1 Hardening for switches

A

Change default credentials, ACLs, Firmware updates, network segmentation, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.1 Hardening for routers

A

change default credentials, encrypted communication, firmware updates, disable unused services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4.1 Hardening for cloud infrastructure

A

IAM, conduct regular security audits, MFA, IRPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4.1 Hardening for Servers

A

Firewalls, disable unnecessary services, strong authentication methods, monitoring, logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4.1 Hardening for ICS/SCADA

A

SCADA: Supervisory Control and Data Acquisition

ICS: Industrial Control Systems

Segment to isolated part of the network, regular patching, IDS, backup and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4.1 Hardening for Embedded Systems

A

They don’t get patch updates often. Install updates as soon as possible, network segmentation for these devices is encouraged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

4.1 Hardening for IoT

A

Update regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4.1 Mobile Deployment Models and their hardening techniques

A

MDM: mobile device management, implement access controls and remote wipe

BYOD: use containerization to separate corporate and personal data, endpoint security, user training

COPE (corporate owned, personally enabled): Fully manage and control these devices, app installation management, data protection for corporate data, regular audits.

CYOD (choose your own device): Identify a list of pre-approved devices, apply baselines, implement access controls, regular updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4.1 Wireless Hardening

A

WPA3, AAA/RADIUS, Cryptographic Protocols, Authentication Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4.1 Authentication Protocols

A

RADIUS: centralized authentication, implement access control, maintain logs, encrypt RADIUS communications

Kereberos, OAuth2, SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

4.1 Application Hardening

A

Input Validation, Secure Cookies (HTTPOnly flags), static code analysis, Code Signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4.2 Procurement considerations for hardware, software, and data

A

Hardware: Evaluate vendors, ensure compatibility and scalability

Software: Acquire licenses/subscriptions or create custom software solutions. Review licensing agreements.

Data: Acquire data sources, databases, and services to interact with databases. Ensure protection standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4.2 Assignment/Accounting considerations for hardware, software, and data

A

Hardware: track ownership with individuals and departments. Classify hardware based on function and lifecycle stage.

Software: Assign licenses, classify software based on purpose and criticality.

Data: classify data based on sensitivty, confidentiality, and regulatory requirements. Ensure access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4.2 Monitoring/Tracking considerations for hardware, software, and data

A

Hardware: up-to-date inventory, track asset locations, usage, and maintenance schedules.

Software: monitor usage and performance. track installations, updates, and patches. Ensure optimization.

Data: monitor data usage and access integrity. Track data flows and perform regular audits.

17
Q

4.2 Disposal considerations for hardware, software, and data.

A

Hardware: properly dispose, including sanitizing data and physicall destroying hardrives. Obtain certificate of destruction.

Software: Decommission software that is no longer needed. Revoke licenses as needed. Ensure no residual data or configurations remain on devices.

Data: Sanitize and securely delete.

18
Q

4.3 Application Vulnerability Management Techniques

A

Static Analysis
Dynamic Analysis
Package Monitoring

19
Q

4.4 SCAP

A

Security Content Automation Protocol. Standardizes the way security software communicates.

20
Q

4.4 Agent/Agentless tools

A

Agentless does not require installing a software.

21
Q

4.4 Signature-based vs. Heuristic-based antivirus

A

signature-based usually identifies previously known threats. Heuristic-based uses rulesets and pattern recognition to identify threats.

22
Q

4.4 NetFlow

A

Network protocol developed by Cisco for collecting IP traffic and analyzing traffic flow and unusual activity.

23
Q

4.5 Screened Subnet

A

AKA DMZ, used for public-facing applications. Establish proper firewall rules to allow specific traffic through.

24
Q

4.5 URL Scanning

A

A web filter should use URL scanning to inspect URLs before allowing users to access them or users to pass them to the application.

On-demand inspection: URL Scanning ocurs in real-time when a user enters a URL or clicks a link.

URL is checked against known databases.

25
Q

4.5 Centralized Proxy

A

Forward and Reverse proxies are both types of centralized proxies. Centralized proxies are intermediaries between end users and the internet.

26
Q

4.5 DNS Filter

A

Uses specialized DNS resolvers to compare queries against a blocklist of domains or IP addresses. Used to block broad categories of internet content. Prevents address resolution for these sites.

27
Q

4.5 DLP

A

data loss prevention

28
Q

4.5 NAC

A

Network Access Control. Allows policy enforcement for devices trying to connect to a network. Rules might include checking credentials (MAC Filtering), checking for up-to-date antivirus software, required configurations, etc.

29
Q

4.5 DEMARC

A

Domain-based message authentication reporting and conformance. Only allows email traffic from approved domains. Checks SPF and DKIM records and reports occurrences to domain owners.

30
Q

4.5 DKIM

A

DomainKeys Identified Mail, adds digital signatures to emails, making it possible to verify that an email came from a certain domain.

31
Q

4.5 SPF

A

Sender Policy Framework. Email validation system, it is a published list of IP addresses that can send email on behalf of a domain.

32
Q

4.5 EDR vs. EXR

A

EDR is classic endpoint protection and response. EXR is extended; it integrates data from multiple security tools such as network and cloud security.

33
Q

4.6 SSO

A

Single Sign On. An authentication process that allows users to log in once and access multiple applications and services. LDAP, OAuth, SAML are examples

34
Q

4.6 LDAP

A

Lightweight Directory Access Protocol. Manages directory information over a network and allows users to take advantage of SSO. OpenVPN, Docker, and Jenkins are all examples.

35
Q

4.6 OAuth

A

Open Authorization. Standard protocol that allows third-party applications to obtain limited access to an HTTP service. Some examples are Google APIs, or other websites that allow you to create an account or login using a different service’s credentials.

36
Q

4.6 SAML

A

Security Assertion Markup Language. XML based standard for exchanging authentication data (web-based). Some examples are Office 365 and AWS. SAML is within a single entity such as Microsoft, unlike OAuth.

37
Q

4.6 Password Vaulting, JIT Permissions, and Ephemeral Credentials

A

All used as privileged access management tools

Password vaulting is like NordPass

Just-in-time permissions is only granting access for a specific duration (think automatic login session timeouts on NSIPS)

Ephemeral Credentials: Temporary authentication tokens, such as OTPs