4.4 Flashcards

1
Q

What is the endpoint

A

The end user device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an application approved list. What is an application deny list.

A

Application approval list
- Nothing will run unless approved
Application deny list
- Nothing on the bad list can be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of approval lists

A

Only allow application with a certain identifier
Certificate
Path
Network Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some configuration changes you would want to keep track of

A
Firewall rules
Mobile Device Management
Data Loss Prevention
Content filter/ URL filter
Updating or revoking certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why would you want to isolate a compromised device

A

Prevent the spread of malicious software

Prevent remote access or Command & Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does a network isolation include isolating to a non remedial VLAN

A

No, It includes isolation to a remediation VLAN and includes no communication to other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Promise Isolation includes:

A

Limit application execution

Preventing malicious activity but allow device management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Containment is Disabling admin sharing, remote management, and local account access?

A

No,
It is running each application in its own sandbox
Limiting interaction with the host operating system and other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How would you contain the spread of a multi-device security event for example ransomware

A

Disable administrative sharing, remote management, local account access and change local administrator password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False segmentation is separating the network so you can prevent unauthorized movement and limit the scope of a breach

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SOAR

A

Security Orchestration Automation and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SOAR Runbooks

A

Linear checklist of steps to perform

Step by step approach to automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SOAR Playbooks

A

Conditional steps to follow; a broad process

Investigate a data breach, recover from ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly