4.0 Security Operations Flashcards

1
Q

Q: What is MDM (Mobile Device Management)?

A

A: Software that manages and secures mobile devices used in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What should you always do with default credentials?

A

A: Change them immediately — they are a major security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What is WPA2 vulnerable to?

A

A: PSK brute force via the 4-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is WPA3 with GCMP?

A

A: Uses AES and GCMP for stronger encryption and MIC for integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What is SAE (Simultaneous Authentication of Equals)?

A

A: A Diffie-Hellman-based key exchange used in WPA3, replacing the 4-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What is the Dragonfly Handshake?

A

A: WPA3’s mutual authentication method using SAE — no pre-shared hash sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is the AAA framework?

A

A: Authentication, Authorization, and Accounting — tracks user identity and actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: What are secure cookies?

A

A: Cookies sent over HTTPS that are marked as secure and HttpOnly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is SAST (Static Application Security Testing)?

A

A: Analyzes source code for security flaws without running it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What is fuzzing?

A

A: Sending random inputs to an app to find crashes or unexpected behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What is code signing?

A

A: Using digital signatures to verify code integrity and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What is degaussing?

A

A: Using a magnetic field to wipe data from storage media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is media sanitization?

A

A: Removing sensitive data before reuse or disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is CVE?

A

A: Common Vulnerabilities and Exposures — catalog of known security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: What is SIEM?

A

A: Security Information and Event Management — collects, analyzes, and alerts on security logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is SCAP?

A

A: Security Content Automation Protocol — standardizes security tool output and benchmarks.

17
Q

Q: What is SNMP?

A

A: Simple Network Management Protocol — gathers network stats via polling or traps.

18
Q

Q: What is NetFlow?

A

A: A protocol for collecting IP traffic data across a network.

19
Q

Q: What is Active Directory?

A

A: A Microsoft service for managing users, groups, and devices in a network.

20
Q

Q: What is SELinux?

A

A: Security-enhanced Linux — uses Mandatory Access Control (MAC) for stricter permissions.

21
Q

Q: What are examples of insecure vs secure protocols?

A

Telnet → SSH

HTTP → HTTPS

FTP → SFTP

IMAP → IMAPS

22
Q

Q: What is SPF (Sender Policy Framework)?

A

A: Email authentication method that specifies allowed sending mail servers.

23
Q

Q: What is DKIM (DomainKeys Identified Mail)?

A

A: Uses digital signatures to validate email content integrity.

24
Q

Q: What is DMARC?

A

A: Defines how to handle emails failing SPF or DKIM checks.

25
Q

Q: What is FIM (File Integrity Monitoring)?

A

A: Detects changes to files by comparing them to a known-good baseline.

26
Q

Q: What is SFC (System File Checker)?

A

A: Windows tool that scans and restores corrupted system files.

27
Q

Q: What is EDR (Endpoint Detection & Response)?

A

A: Detects and investigates suspicious behavior on endpoints.

28
Q

Q: What is XDR (Extended Detection & Response)?

A

A: Expands EDR across multiple systems with deeper insights and threat detection.

29
Q

Q: What is IAM?

A

A: Identity and Access Management — defines who users are and what they can access.

30
Q

Q: What is LDAP?

A

A: A protocol based on X.500 used for accessing directory services.

31
Q

Q: What is OAuth + OpenID Connect?

A

A: OAuth handles authorization; OpenID handles authentication (SSO).

32
Q

Q: What is SAML?

A

A: Used for third-party web-based authentication via tokens.

33
Q

Q: What are the types of access control?

A

MAC: Access based on labels

DAC: Owner decides access

ABAC: Access based on attributes like time, location

34
Q

Q: What is NIST’s role in incident response?

A

A: Provides guidelines for handling and recovering from security incidents.

35
Q

Q: What is the chain of custody?

A

A: Documentation showing who handled evidence and when.

36
Q

Q: What are log files used for?

A

A: Recording system events (e.g., blocked traffic, app crashes).

37
Q

Q: What types of logs are important for security?

A

A: Application, OS, network, IPS/IDS, endpoint, metadata.