7 - 1: Host Security Flashcards

1
Q

Security baselines

A

Limit administrative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patch Management

A

Policy to ensure patches are issued in a timely manner, critical for security issues. Analyze the outcomes of patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System Hardening

A

Remove unnecessary software and OS components, lockdown host firewall, disable default credentials, verify sysconfig settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses

A

Spread because of human activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Spread by themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan horses

A

Act as wanted/expected software while carrying malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Gathers information and user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antivirus mechanisms

A

Signature detection and behavior/heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Signature detection

A

Watches for known patterns of activity. Requires updating signature files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Behavior/Heuristic detection

A

Model normal behavior, then alerts when there is deviant behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR

A

Endpoint Detection and Response, goes deeper than regular antivirus software, real-time protection using endpoint agents and automated responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sandboxing

A

Isolates malicious content when it runs, sending it off for monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam filtering

A

Blocks unwanted mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware logging

A

Keep a centralized reporting location to review security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application control

A

Restricts the software that runs on endpoints, typically reported to SIEMs

17
Q

Whitelisting

A

For tightly controlled environments, its what software can only be used

18
Q

Blacklisting

A

For looser environment, it is a list of prohibited applications

19
Q

Host Software Baselining

A

Standard list of software expected on endpoints, then reports deviations to identify unwanted software

20
Q

Firewalls

A

Restrict traffic and only allow devices that meet security policy to proceed

21
Q

Default Deny Rule

A

Firewalls, by default, block any network connection not explicitly allowed

22
Q

Firewall Types

A

Network firewalls and host firewalls. Network access requires BOTH to be configured

23
Q

Network firewalls

A

Hardware devices that regulate connections between two networks

24
Q

Host firewalls

A

Software components of an operating system that limit connections to a server

25
Next Generation Firewalls
Designed to use behavioral information to decide network traffic in real time
26
Intrusion Detection Systems
Monitor for suspicious activity and alert sysadmins
27
Intrusion Prevention Systems
Intervene to block suspicious activity once it's detected
28
File Integrity Monitoring
Watch for unexpected file changes and report on them using cryptographic hashing
29
FIM tuning
Some file changes are expected, so it's important to tune detection capabilities so as to not over or under alert
30
Data loss prevention
Technology that searches systems and monitors networks for unsecured sensitive information, and provides the ability to block, remove, or encrypt it
31
DLP types
Host-based and network-based
32
Host-based
Detects sensitive information stored on endpoints
33
Network-based
Scans and monitors network transmissions for sensitive information
34
Pattern matching
A detection method analyzing patterns to indicate what data is being moved. Can also be based on a repository of key terms
35
Watermarking
Uses electronic tags to mark sensitive information
36
Linux command to apply database updates
yum