4.1-4.4 Flashcards

1
Q

3 steps of secure baselines

A

establish
deploy
maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

mdm

A

mobile device management. used to mannage company owned mobile devices. set policies on apps,data, control the remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COPE

A

Corporate ownerd, personally enabled. company buys the device, used as both a corporate and personal. full control belongs to organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CYOD

A

Choose your own device.
Like COPE but user chooses the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wpa3 , psk authentication process

A

USES SAE to create pmk
creates a shared session key that doesn’t need to be sent across network. no fourway handshake no hash no brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAE

A

SAE-everyone uses the same psk with a different session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA framework

A

authentication authorization accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

radius

A

common aaa protocol, centralizes authentication. remote vpn access. server authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

input validation

A

check and correct all input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAST

A

Static Application Security Testing. Help to identify security flaws in code. Not always accurate so needs verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

app monitoring

A

watch for blocked injection attempts, app usage, unusual file transfers, increase in client access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

enumeration

A

list all parts of an asset (cpu,memory,storage drive, keyboard,mouse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sanitization

A

system disposal or decommissioning, completely remove data. to destroy or to recycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

certification of destruction

A

certificate of destruction after device has been disposed of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data retention

A

backup your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

dynamic analysis(fuzzing)

A

send random input to an application, looking for something out of the ordinary. many diff types of fuzzing engines

17
Q

cta

A

cyber threat alliance. members allow specific threat intelligence. this is a information sharing organization

18
Q

prioritize vulnerabilities

A

not every vulnerability shares the same priority. some are critical some are not.

19
Q

cvss

A

common vulnerability scoring system 0-10

20
Q

exposure factor

A

loss of value of business activity if the vulnerability is exploited.

Example: a small ddos may limit access to a service. -50% exposure factor

21
Q

secure enclave

A

the tpm of a mobile device

22
Q

exception

A

not dealing with a vulnerability because it has low severity score. usually needs formal process to approve

23
Q

risk tolerance

A

the amount of risk acceptable to an organization

24
Q

reporting

A

ongoing checks for vulnerabilities

25
Q

monitoring

A
26
Q

archiving

A

access to data is critical,collecting older data and moving it to a protected location so that it can be retrieved if needed

27
Q

alert tuning

A

a balancing act, prevent false positives and false neg

28
Q

SCAP

A

Security content automation protocol. allows tools to identify and act on the same criteria. language for all tools to use basically

29
Q

snmp

A

simple network management protocol uses mib managament information base that uses oid object identifiers to poll devices at fixed intervals over udp 161

30
Q

snmp traps

A

over udp 162