4.4 - 4.5 Flashcards

1
Q

End point security

A

Our devices are our endpoints ,

Allows/denied app list through approved list

Block list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Configuration changes

A

Firewall rules

Mobile device manager

Data loss prevention

Url filter to block sites

Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Isolation

A

Process isolation, network isolation administrative isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Containment

A

Putting malware in sandbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Segmentation

A

Prevent unauthorized movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Soar

A

Security orchestration automation response,

Using mutilpe third party tools and running them together with run books playbook is more advanced with combined run books inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital forensics

A

Rfc-3237 evidence id collection and archiving

Acquisition analysis and archiving

Legal hold what type of data is needed for us and requires admissibility and chains of custody with documentation of different timezones of device event logs and interviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Forensic data acquisition

A

Order of volatility from most to least,
cpu registers, cpu cache;
router table, arp cache, orocess table, kernel stats, memory;
Temp internet files;
Disk;
Remote logging and monitoring data;
Physical config, network topology;
Archival media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On premises vs cloud

A

For forensics in cloud , right to audit clause for the provider to disseminate data

Look up regulatory and jurisdiction of that data

Data breach notification laws id its consumer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Manageing evidence

A

Integrity checks with hashing, provenance and checksums

Preservation while handling evidence by copying everything sometimes via live collection

E-discovery gathering the data, not analyzing just gathering details of electronic discovery

Data recovery for deleted or inaccessible data

Non repudiation of knowing who sent the data with mac or digital sig

Strategic intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly