Chapter 18 Flashcards

1
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EDR

A

Endpoint Detection Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FDE

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIDS

A

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HSTS

A

HTTP Strict Transport Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware is short for

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NGFW

A

Next Generation Fire Wall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCR

A

Platform Configuration Registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SDLM

A

Software Development Lifecycle Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SED

A

Self-Encrypting Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SP in Windows SP means

A

Service Pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TPM

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UEFI

A

Unified Extensible Firmware Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UEM

A

Unified Endpoint Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UTM

A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A secure mechanism to verify the integrity of an IoT gateway during boot time.

A

Boot Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of HIDS?

A

To detect undesired elements in network traffic to and from the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of a HIPS?

A

To detect undesired elements in network traffic but also protect the network from the malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Served to prevent sensitive data from leaving the network without notice.

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ensures that a device boots using only software that is trusted by the Original Equipment Manufacturer.

A

Secure Boot.

23
Q

Process of adding random strings of characters to passwords in a database or each password before they are hashed to make them more secure.

A

Salting.

24
Q

A software application made by Microsoft used to scan, detect, and remove viruses, spyware, and malware.

A

Windows Defender

25
Q

A free open source utility for network discovery and security auditing.

A

NMap.

26
Q

An open source GUI which aims to make NMap easier for beginners.

A

ZenMap

27
Q

Services are accessed using what two ports?

A

TCP and UDP

28
Q

Small blocks of data created by a web server while a user is browsing a website and placed on the user’s computer or other device.

A

Cookie

29
Q

A physical or embedded security technology that resides on a computer’s motherboard or processor.

A

TPM (Trusted Platform Module)

30
Q

The process of testing input received by an application for compliance against a standard defined within the application.

A

Input Validation

31
Q

What are allow and deny lists?

A

An allow list is a list of approved applications. A block/deny list is a list of applications that should not be allowed to run.

32
Q

A directive that declares browsers should only interact via HTTPS, never HTTP, with a max time of 3600 seconds.

A

HSTS [HTTP Strict Transport Security]

33
Q

What is the purpose of input validation?

A

To validate data input by the user, and repeat the request for the data in the case where input of the user is not valid.

34
Q

A source that can always be trusted within a cryptographic system.

A

Hardware Root of Trust

35
Q

Hardware based standard that is used for applying hardware-based encryption to mass storage devices.

A

Opal

36
Q

What is the challenge in allow listing?

A

The number of potential applications that are run on a typical machine.

37
Q

What host-based firewall is included in Windows OS?

A

Windows Defender Firewall

38
Q

A physical device that connects to a computer network and exchanges data or commands with other devices.

A

Endpoint

39
Q

The quarantine or isolation of a system from its surroundings.

A

Sandboxing

40
Q

Two other server operating systems other than Windows.

A

Linux and VM/Hypervisor

41
Q

What’s the purpose of hotfixes, patching, and service packs?

A

To make sure the software and hardware of a system is up to date on the latest updates to better keep them secured and working efficiently.

42
Q

What are FDE and SDE?

A

Methods of implementing encryption on hard drives.

43
Q

What is the difference between Heuristic-scanning and signature-scanning?

A

Heuristic scanning looks for specific commands or instructions that would not typically be found in an application, signature scanning uses a virus dictionary to look for malware and viruses.

44
Q

What is the purpose of a security appliance?

A

To keep a system protected from malicious activity.

45
Q

Why does encryption and obfuscation pose problems for anti-malware?

A

If a virus or malware is encrypted then the antimalware won’t be able to find it in its signature dictionary.

46
Q

What code has weaknesses and vulnerabilities?

A

All code.

47
Q

How Root of Trust applies to UEFI

A

To ensure that a known, certified boot loader is used to load the next stage loader/manager or O/S kernel.

48
Q

Why would a security specialist run Netstat?

A

To have a statistics of all active connections in a system, making it easier to monitor and identify problems.

49
Q

A repository of all information related to configurations.

A

Registry

50
Q

What are hive keys?

A

Keys use to access the registry.

51
Q

In what three ways can antimalware resolve malware issues?

A

Quarantine, Remove, and block.

52
Q

How often are new security advisories released?

A

Once a week, every monday.

53
Q

What does high-level software mean?

A

Applications close to user level.

54
Q

What is MITRE and OWASP?

A

Websites that list all known software exploits and vulnerabilities.