7 - 1: Host Security Flashcards

1
Q

Security baselines

A

Limit administrative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patch Management

A

Policy to ensure patches are issued in a timely manner, critical for security issues. Analyze the outcomes of patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System Hardening

A

Remove unnecessary software and OS components, lockdown host firewall, disable default credentials, verify sysconfig settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses

A

Spread because of human activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Spread by themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan horses

A

Act as wanted/expected software while carrying malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Gathers information and user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antivirus mechanisms

A

Signature detection and behavior/heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Signature detection

A

Watches for known patterns of activity. Requires updating signature files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Behavior/Heuristic detection

A

Model normal behavior, then alerts when there is deviant behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR

A

Endpoint Detection and Response, goes deeper than regular antivirus software, real-time protection using endpoint agents and automated responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sandboxing

A

Isolates malicious content when it runs, sending it off for monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam filtering

A

Blocks unwanted mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware logging

A

Keep a centralized reporting location to review security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application control

A

Restricts the software that runs on endpoints, typically reported to SIEMs

17
Q

Whitelisting

A

For tightly controlled environments, its what software can only be used

18
Q

Blacklisting

A

For looser environment, it is a list of prohibited applications

19
Q

Host Software Baselining

A

Standard list of software expected on endpoints, then reports deviations to identify unwanted software

20
Q

Firewalls

A

Restrict traffic and only allow devices that meet security policy to proceed

21
Q

Default Deny Rule

A

Firewalls, by default, block any network connection not explicitly allowed

22
Q

Firewall Types

A

Network firewalls and host firewalls. Network access requires BOTH to be configured

23
Q

Network firewalls

A

Hardware devices that regulate connections between two networks

24
Q

Host firewalls

A

Software components of an operating system that limit connections to a server

25
Q

Next Generation Firewalls

A

Designed to use behavioral information to decide network traffic in real time

26
Q

Intrusion Detection Systems

A

Monitor for suspicious activity and alert sysadmins

27
Q

Intrusion Prevention Systems

A

Intervene to block suspicious activity once it’s detected

28
Q

File Integrity Monitoring

A

Watch for unexpected file changes and report on them using cryptographic hashing

29
Q

FIM tuning

A

Some file changes are expected, so it’s important to tune detection capabilities so as to not over or under alert

30
Q

Data loss prevention

A

Technology that searches systems and monitors networks for unsecured sensitive information, and provides the ability to block, remove, or encrypt it

31
Q

DLP types

A

Host-based and network-based

32
Q

Host-based

A

Detects sensitive information stored on endpoints

33
Q

Network-based

A

Scans and monitors network transmissions for sensitive information

34
Q

Pattern matching

A

A detection method analyzing patterns to indicate what data is being moved. Can also be based on a repository of key terms

35
Q

Watermarking

A

Uses electronic tags to mark sensitive information

36
Q

Linux command to apply database updates

A

yum