Chapter 11 Flashcards

1
Q

Ways in which we can decrease our attack surface

A
  1. Removing unnecessary software
  2. Removing Unessential services
  3. Alter default accounts
  4. Use the Principles of Least Privilege
  5. Perform updates in a timely manner
  6. Implement logging and auditing functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Detects threats

A

Anti-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technology that prevents the operating system and applications from using certain portions of the memory to execute code. Requires both a hardware component and a software component.

A

Executable Space Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Intel call their implemented Executable Space Protection components?

A

Execute Disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AMD call their implemented Executable Space Protection components?

A

Enhanced Virus Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that works by inputting more data than an application is expecting. (entering 10000 characters into a field that was only expecting 10

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contains a subset of the features we might find on a large firewall appliance

A

Software Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIDS

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are used to analyze the activities on or directed at the network interface of a particular host. (Reduces scope of features than a Network Intrusion Detection System)

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aimed at finding and reporting network services on hosts that have known vulnerabilites

A

Vulnerability Assessment Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A collection of prepackaged exploits and tools, such as network mapping tools and sniffers

A

Exploit Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly