701 - Section 2 Flashcards

1
Q

What is the entity responsible for an event that has an impact on the safety of another entity called?

A

Threat actor or a malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three attributes of threat actors?

A

Internal or external, resources or funding, level of sophistication or capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is it important to find the motivation of a threat actor?

A

Because it identifies the purpose of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name five or more motivations for attackers?

A

Data exfiltration, espionage, service disruption, blackmail, financial gain, philosophical or political beliefs, ethical, revenge, disruption or chaos, war

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Constant nation state attacks with massive resources are also known as

A

An advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the location, resources, sophistication attributes of a nation state threat actor?

A

External, extensive, very high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the location, resources, sophistication attributes for an unskilled threat actor?

A

External, limited, very low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the location, resources, sophistication attributes for a Hacktivist threat actor?

A

External, some funding, can be high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the location, resources, sophistication attributes for an insider threat threat actor?

A

Internal, many resources, medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the location, resources, sophistication attributes for an organized crime thread actor?

A

External, often extensive, very high

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the location, resources, sophistication attributes for a shadow IT threat actor?

A

Internal, many resources, limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the possible motivations for a nation state thread actor?

A

Data filtration, philosophical, revenge, disruption, war

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the possible motivations for an unskilled threat actor?

A

Disruption, data, exfiltration, philosophical beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the possible motivation for a Hacktivist thread actor?

A

Philosophical beliefs, revenge, disruption chaos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the possible motivations for an insider threat threat actor?

A

Revenge and financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the possible motivations for an organized crime thread actor?

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the possible motivations for shadow IT thread actor?

A

Philosophical beliefs and revenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the method used by an attacker to gain access or to infect a target?

A

A threat vector or an attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are three types of message based attack vectors?

A

Fishing attacks for example, providing a link in an email or a text, delivering malware to a user for example and attachment within an email, social engineering attacks for example, invoice or cryptocurrency scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What image format is known as a threat?

A

The scalable vector graphic format, SVG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are two attack types of an image based attack?

A

HTML injection and JavaScript attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What can defend against an image based attack?

A

A web browser providing input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are three file based threat vectors?

A

Adobe PDF, zip or RAR files, Microsoft Office files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the four types of voice call attack vectors?

A

Vishing which is fishing over the phone spam over IP, war dialing, call tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does an attacker use for a removable device attack vector?

A

A USB drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which attack vector can infect an air gapped network?

A

A removable device attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are two types of software used for a vulnerable software attack vector?

A

Client and agentless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the differences between a client based vulnerability and an agent less software vector vulnerability?

A

For a client based, it is an infected executable that requires installation whereas agentless is not an installed executable, and the impact would affect all users using the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are two examples of unsupported system vectors?

A

A system that isn’t regularly patched and an outdated operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the best way to prevent an unsupported system attack vector?

A

Making sure every system is patched and has all the latest updates, as a single system could represent an entry point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the best way to prevent an open service port attack vector?

A

Adding firewall rules for every open port as each one represents a potential entry point for an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the best way to prevent a default, credential attack vector?

A

Changing all default username and passwords, as it’s very easy to find the default credentials for every device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Why is a supply chain attack vector difficult to defend against?

A

Because they provide many points of entry and some or most are out of an organizations control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are two methods to defeat a fishing attack vector?

A

Check the URL of all links by hovering over them and usually there’s something not quite right with the spelling, the fonts or the graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is at the root of a business email compromise attack vector?

A

Because we trust the email source and the attacker takes advantage of this trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Why are tricks and misdirection attack vectors difficult to defend against?

A

Because of how realistic that they are. There may be a slight typo in the URL known as typosquatting or they use a highly believable character in a realistic situation also known as pre-texting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are two types of fishing that use voice and SMS messages?

A

Vishing known as voice phishing and Smishing known as SMS phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why are impersonation attacks so successful?

A

Because they include a realistic pretext or story

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are some of the methods used in an impersonation attack?

A

They use pieces of information that they know about you, they will act as if they are higher in rank, they will throw many technical details around, they will act as if they are your friend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the result of a successful impersonation attack against a person?

A

They have enough information regarding your identity to commit fraud such as credit card for fraud, bank fraud, loan fraud, government benefits fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are ways you can protect against impersonation?

A

Never volunteer any personal information or personal details and always verify through third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How does a watering hole attack work?

A

By infecting a website or system, which an organization is known to use.. these infections can impact just those in the organization or they can infect all visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How do you defend against a watering hole attack?

A

Using a lay defense known as defense in depth, firewalls, update to date antivirus and anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does a misinformation or disinformation attack work?

A

Attackers create fake users and fake content, they post on social media and amplify the message, real users begin to share the message, then the mass media picks up the story

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the different types of processes that a memory injection attack can infect?

A

Malware can be hidden in all of these… DLLs, threads, buffers, memory management functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the two types of memory injections?

A

Memory and DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How does a memory injection attack work?

A

By adding the malicious code into the memory of an existing process, which allows access and system privileges to the data in that process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How does a DLL injection attack work?

A

An attacker injects a path to the malicious DLL, which then runs as part of the target process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How does a buffer overflow attack work and what does it need to be successful?

A

By overwriting a buffer of memory which spills into other memory areas. This is not a simple exploit, and the buffer overflow needs to be repeatable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How do you defend against a buffer overflow attack?

A

By having the developers perform bounds checking within their code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How does a race condition work?

A

It is a result of two conditions happening at the same time that can produce a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is another name for a race condition attack?

A

Time of check to time of use attack TOCTOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the best defense against malicious updates?

A

Keeping your operating system and applications up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How do you prevent against a malicious update when downloading an update?

A

By having a good known backup , By confirming the source visiting the trusted download site directly and not disabling operating system security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How do you defend against an operating system vulnerability?

A

By having a good back up in case of an issue and always keeping the system up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How does a SQL injection attack work?

A

The attacker will add their own malicious bits of SQL code into a form field that is submitted to the server and executed within the DB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the best defense against a SQL injection attack?

A

Having the application properly validate and properly escape (using escape keys) all input and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How does a cross site scripting attack work?

A

Attacker sends a link containing malicious script to a victim, the victim clicks the link and visits the legitimate site, the legitimate site loads in the victims browser and the malicious script is executed. the malicious script sends the victims information to the attacker. This includes credentials session IDs, and cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the two types of cross scripting attacks?

A

A non-persistent or reflected attack and a persistent or stored attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How does a non-persistent (aka reflected) cross scripting attack work?

A

An attacker emails a link that execute the script that sends credentials, session, IDs, cookies to the attacker…this script is embedded within a URL…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a common source of a cross site scripting attack? And why?

A

A website search box…Search boxes accept user input, which can be manipulated by attackers to inject malicious code. If the input is not properly sanitized or validated, it opens up the possibility for attacks like SQL injection or cross-site scripting (XSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is a persistent or stored scripting attack?

A

When the attacker post a message to a social network that includes the malicious payload. It’s called persistent because everyone who views the page will get this malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How do you protect against a cross site scripting attack?

A

By avoiding clicking on untrusted links, disabling JavaScript in your browser, keeping your browser and applications properly updated and validating input fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Why are hardware vulnerabilities so dangerous?

A

Because we are surrounded by intelligent hardware devices, many of which do not have an accessible operating system. Each of these pose an entry point for an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are main security risks with hardware vulnerabilities?

A

The vendors are the only ones who can fix their issues, assuming they know about the problem, or care about fixing it… The end of life or the technological end of service life, which is the time when the product stops being sold and or stops being supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is a legacy platform?

A

A device that has been running for a length of time and no longer is receiving updates to its software

67
Q

What does a virtualization vulnerability pertain to?

A

A virtual machine

68
Q

What are the different vulnerabilities associated with a virtualization vulnerability?

A

Local privilege escalations, command injection, information disclosure

69
Q

What is VM escape mean?

A

An issue where an attacker is able to break out of the VM and interact with the host operating system or hardware… this will allow an attacker to potentially gain full control of the virtual environment…

70
Q

Why does a VM escape happen?

A

Because the hyper visor manages the VM‘s on a server, and those resources can be reused between VMs allowing data to be in advertently shared between the VM’s

71
Q

What is the best way to mitigate the risk of a virtualization vulnerability?

A

By properly updating your VM software

72
Q

What are some of the reasons why we have cloud specific vulnerabilities?

A

Cloud adoption has been nearly universal, much sensitive data is in the cloud, the right protections are not being utilized by organizations including simple, best practices

73
Q

What are some of the ways that a cloud service can be attacked?

A

Denial of service, taking advantage of week or faulty authentication, faulty directory traversal
configurations, remote code execution and taking advantage of unpatched cloud systems

74
Q

What are some of the ways to mitigate a supply chain vulnerability?

A

Contractual ongoing security audits of all providers, using a small trusted supplier base, confirming digital signatures from updates provided by software vendors

75
Q

What makes a supply chain so vulnerable to attack?

A

The chain contains many moving parts and an attacker can affect any step along the way which can infect the entire chain

76
Q

What are the different types of misconfiguration vulnerabilities?

A

Open permissions which are easy for a hacker to find, unsecured administrator accounts, using insecure protocols vice their encrypted counterparts, using default settings, and ports opened by services that are not configured properly

77
Q

What does MDM stand for?

A

Mobile device manager

78
Q

What does jailbreaking or rooting mean?

A

When a mobile devices operating system is replaced by a different operating system

79
Q

What makes jailbreaking or rooting dangerous?

A

Uncontrolled access to the device that circumvent security features and the MDM becoming relatively useless with a jailbreak or rooted device

80
Q

What is sideloading?

A

Apps that are loaded onto a mobile device that do not come from an approved App Store

81
Q

What is a zero day vulnerability?

A

It is a vulnerability that the vendor has no awareness of… applications have vulnerabilities, they just have not yet been identified…

82
Q

What is a zero day attack?

A

An attack on an unknown vulnerability for which the vendor has no fix for this unknown problem…

83
Q

What is an IDS?

A

Intrusion detection system

84
Q

What is an IPS?

A

Intrusion prevention system

85
Q

What is an SIEM?

A

Security information and event manager system, think SPLUNK

86
Q

What is another name for malicious software?

A

Malware

87
Q

Name three things that malware can do to your system

A

Gather information such as your keystrokes, show you advertising, encrypt your system

88
Q

Name five malware types and methods?

A

Viruses, worms, ransomware, Trojan horse, root kit, key logger, spyware, bloatware, logic bomb

89
Q

What are the ways your system get malware?

A

A link in an email, a webpage pop-up, a drive-by download, a worm

90
Q

What is the name of malware that makes your data unavailable until you provide cash? And how does it work?

A

RansomWare… With malware, your system will run, but because everything is encrypted it will effectively not work upon payment. A description key will be provided to you.

91
Q

How do you protect against ransomware?

A

Always have a good off-line backup, keep your system up-to-date with security patches, keep your antivirus anti-malware signature up-to-date

92
Q

What type of malware can reproduce itself?

A

A virus

93
Q

What are the four types of viruses?

A

A program virus which is part of an application, a boot sector virus, a script virus, a macro virus which are common in Microsoft Office

94
Q

What type of virus is good at avoiding detection, is never installed in any file or application and operates in memory?

A

A file less virus

95
Q

What type of virus self replicates, spreads quickly and uses a network as a transmission medium

A

A worm

96
Q

What can mitigate many worm infestations?

A

A firewall, an IDS, and IPS

97
Q

What does a fireless virus use to be restarted?

A

It adds an auto start to the registry

98
Q

What is malware that spies on you by monitoring your browser, and capturing your key strokes?

A

Spyware

99
Q

How do you protect against spyware?

A

Keeping your antivirus and anti-malware software up-to-date, watch additional options during installation of software, having an offsite back up

100
Q

What do you call applications that are preinstalled on a system but are not needed and can cause a system to run slower?

A

Bloatware

101
Q

To remove bloatware, what do you need to do?

A

Identify and remove it

102
Q

To remove bloatware, what do you need to do?

A

Identify and remove it

103
Q

What is the malware that captures your key strokes, including such things as login, IDs, passwords, etc.?

A

Keyloggers

104
Q

What is the type of malware that waits for a predefined event whether it be a date or time, or a user event?

A

A logic bomb

105
Q

How do you prevent against a logic bomb even though it is difficult to recognize?

A

Have a formal change control procedure and process, electronic monitoring of the system that alerts on any changes, constant auditing by the administrator

106
Q

What is a root kit? And why is it difficult to deal with?

A

Malware that modifies core system files in other words, part of the kernel… It is not a separate task so it won’t be seen in task manager, and it is also invisible to traditional antivirus utilities

107
Q

How do you find and remove a root kit?

A

Look for anything unusual with anti-malware, scans, use a remover specific to the root kit, which are usually built after the root kit is discovered

108
Q

What does secure boot with UEFI provide

A

It provides security in the bios, which helps protect against a root kit

109
Q

Name four types of physical attacks?

A

Brute force to gain access to the server, RFID cloning, environmental attacks.

110
Q

Which type of physical attack would use a counterfeit badge or fob?

A

RFID Cloning

111
Q

Which type of physical attack would attack everything supporting the technology, the power, HVAC or any other structure/device supporting the system

A

An environmental attack

112
Q

What kind of attack forces a service to fail by overloading it?

A

Denial of service

113
Q

What are the different types of denial of service?

A

A friendly one, a DDOS, a DDOS reflection and amplification

114
Q

Which denial of service will turn a small attack into a big one by reflecting off of another device or service?

A

DDOS reflection and amplification

115
Q

What does a DDOS reflection and amplification attack use?

A

It uses protocols with Lil if any authentication or checks… NTS, DNS, ICMP are examples

116
Q

Which denial of service relies on an army of computers using all the bandwidth or sources? And what is the name given to this army of computers?

A

A distributed denial of service attack… a botnet

117
Q

How can a friendly denial of service attack happen?

A

By performing network intensive operations or by using a lot of bandwidth, for example, by downloading a large file

118
Q

What are three ways that DNS poisoning can occur?

A

By modifying the DNS server, modifying the client host file or by sending a fake response to a valid request (on path attack)

119
Q

What is it called when an attacker gets access to the domain registration, which controls where all of the traffic flows?

A

Domain hijacking

120
Q

What kind of attack relies on a slight change to a URL to confuse users?

A

URL hijacking

121
Q

Using typo, squatting/brand jacking, outright misspellings or using different top level domains are all examples of what?

A

Types of URL hijacking

122
Q

What wireless standard includes a number of management features that protect against attackers?

A

802.11

123
Q

Which standard protects against wireless deauth attacks? And how does it protect?

A

802.11W… By encrypting certain important management frames that are used in a deauth attack…

124
Q

What kind of wireless attack prevents wireless communication by transmitting, interfering wireless signals?

A

Radio, frequency, RF jamming, it is effectively a denial of service attack

125
Q

What type of wireless attack is similar to RF jamming but instead is sending #DATA to jam the communications?

A

Wireless jamming

126
Q

What does ARP stand for?

A

Address resolution protocol

127
Q

Which attack passes the communication through the attacker who redirects the traffic and then passes it to the destination?

A

And on path network attack formally known as a man in the middle attack

128
Q

Which attack is similar to an on path network attack, but the attacker, using malware, proxies all of the network traffic from the same computer as the victim

A

On path, browser attack, formally known as man in the browser

129
Q

Which attack takes advantage of the useful information from a user that is transferred over the network, including things such as cookies and session IDs?

A

A replay attack

130
Q

Which type of replay attack is where the attacker captures the username and password hash and uses it to send their own request from the captured credentials?

A

Pass the hash

131
Q

Which type of replay attack is where the attacker intercepts the session ID and uses it to access the server with the victims credentials

A

Session hijacking also known as side jacking

132
Q

Which type of replay attack modifies the headers and or the cookies?

A

Header manipulation

133
Q

What are two ways to prevent session hijacking?

A

Encrypt end to end using HTTPS and encrypt end to somewhere using a VPN

134
Q

What might a layered defense use to protect against malicious code attacks?

A

Firewall, anti-malware and anti-virus, continuous updates and patches, using secure computing habits

135
Q

Which type of attack allows an attacker to gain a higher access level to a system by exploiting a vulnerability within an application?

A

Privilege escalation

136
Q

Which attack takes advantage of the trust that a web application has for a user? And what can be used to prevent such an attack?

A

Cross site request forgery, aka XSRF or CSRF… anti-CSRF tokens

137
Q

How does a cross site request forgery attack work?

A

An attacker creates a funds transfer request, that request is sent as a hyperlink to a user who may be already logged into the website, the user click the link which unknowingly sends the transfer request to the bank website, the bank validates the transfer and sends the funds to the attacker

138
Q

Which type of cryptographic attack Requires an attacker to generate many versions of plain text in an attempt to find a collision? And how do you protect yourself against a birthday attack?

A

A birthday attack By using a large hash output size

139
Q

What is the type of an on path attack, which rewrites the URL by removing the S on the request? And why is it dangerous?

A

SSL stripping because the attacker reverts the original HTTPS request to HTTP and the user unknowingly communicates via HTTP and all of their subsequent requests are sent clear text

140
Q

What form of a password attack is when the attacker might use a few common passwords against each account?

A

A spraying attack

141
Q

What type of password attack would attempt to match every password or password against a users password?

A

A brute force attack

142
Q

What is an event that indicates an intrusion?

A

An indicator of compromise

143
Q

What are five indicators of compromise?

A

Unusual amount of network activity, changes to file hash values, irregular international traffic, uncommon login patterns, spikes of read request to certain files, DNS data changes

144
Q

This indicator of compromise locks a users account from a brute force attack?

A

Account lockout

145
Q

This indicator of compromise shows up as an account logging in from multiple locations at the same time?

A

Concurrent session usage

146
Q

This indicator of compromise shows up as a user logging into system from two locations that is not physically possible within the timeframe of each login?

A

Impossible travel

147
Q

This indicator of compromise may show up as activity at an unusual time?

A

Resource consumption

148
Q

This indicator of compromise shows up when these are no where to be found?

A

System logs

149
Q

What are the two lists that are used by an operating system to limit usage? And what are they also known as? And which one is more restrictive?

A

Allow or Whitelist, Deny or Blacklist…the allow list is more restrictive

150
Q

What is another name for separating the physical logical or virtual devices on a network?

A

Segmenting the network

151
Q

What is a mitigation technique that requires prompt updating of systems?

A

Regular Patching or updating

152
Q

Name five mitigation techniques?

A

Patching, encryption, monitoring, least privilege, configuration enforcement, decommissioning

153
Q

Which medical mitigation technique requires a physical device to be formatted or destroyed after initial usage?

A

Decommissioning

154
Q

Which mitigation technique performs a security posture assessment upon each device connection?

A

Configuration enforcement

155
Q

Which mitigation technique, assigns rights, and permissions to the bare minimum of what’s needed to execute the system?

A

Least privilege

156
Q

Which mitigation technique aggregates logging information from all the sensors (IPS, firewall logs, web servers logs, DB logs, email logs, etc?

A

Monitoring

157
Q

What does an SIEM do?

A

It aggregates and collects all types of sensor/logging data and provides an engine in which a user can compare and query the data… Think spunk

158
Q

What mitigation technique prevents easy viewing of system data? And what are some of the types?

A

Encryption… file system, full disk (bit locker or FileVault), file level (Windows EFS) , application data

159
Q

What is it when you apply best practices to a system across all defense layers?

A

Hardening techniques

160
Q

What does EDR stand for and what is it?

A

Endpoint detection and response…it is software that continuously monitors for threats and provides the ability to detect, investigate and respond to threats

161
Q

What is software that allows or disallows, incoming or outgoing application traffic and can identify and block unknown processes?

A

Host based firewall

162
Q

What is a prevention system that recognizes and blocks known attacks and validates incoming service request?

A

Host based intrusion and prevention system a.k.a. HIPS

163
Q

Name three other best practice hardening techniques?

A

Closing of all ports except for those that are required, require default password changes, removal of unnecessary software

164
Q

What is another name for a layered defense?

A

Defense in depth