Chapter 4: Endpoint And Application Development Security Flashcards

1
Q

A metric of the upper and lower bounds of specific indicators of normal network activity

A

Key Risk Indicators (KRIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An indicator that malicious activity is occurring but is still in the early stages

A

Indicator of compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An evaluation used for discovering an attack before it occurs

A

Predictive analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anything that can be used freely without restrictions

A

Open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A repository by which open source cybersecurity information is collected and disseminated

A

Public information sharing centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Four CISCP privacy protection umbrellas include …

A
  1. Cybersecurity Information Sharing Act (CISA)
  2. Freedom of Information Act (FOIA)
  3. Traffic-Light Protocol (TLP)
  4. Protected Critical Infrastructure Information (PCII)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technology that enables the exchange of cyber threat indicators between parties through computer-to-computer communication

A

Automated Indicator Sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A language and format used to exchange cyber threat intelligence

A

Structured Threat Information Expression (STIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An application protocol for exchanging cyber threat intelligence over Hypertext Transfer Protocol Secure (HTTPS)

A

Trusted Automated Exchange of Intelligence (TAXII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proprietary information owned by an entity that has an exclusive right to it

A

Closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations participating in closed source information that restrict both access to data and participation

A

Private information sharing centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A repository of known vulnerabilities and information as to how they have been exploited

A

Vulnerability database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An illustration of cyber threats overlaid on a diagrammatic representation of a geographical area

A

Threat map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A storage area in which victims of an attack can upload malicious files and software code that can then be examined by others to learn more about these attacks and craft their defenses

A

File and code repositories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Part of the internet beyond the reach of normal search engines and is the domain of threat actors

A

Dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Securing endpoint computers primarily involves three tasks, including …

A
  1. Confirming that the computer had started safely
  2. Protecting the computer from attacks
  3. Hardening the computer for even greater protection
17
Q

An improved firmware interface developed to replace the BIOS

A

Unified Extensible Firmware Interface (UEFI)

18
Q

When each element in the boot process relies on the confirmation of the previous element to know that the entire process is secure

A

Chain of trust

19
Q

Security checks that begin with hardware checks

A

Hardware root of trust

20
Q

The process of determining that the boot process is valid

A

Boot atteststion

21
Q

A boot security mode where the computer’s firmware logs the boot process so the OS can send it to a trusted server to assess the security

A

Measured Boot

22
Q

Software that can examine a computer for file-based virus infections as well as monitor computer activity and scan new documents that might contain a virus

A

Antivirus

23
Q

A suite of software intended to provide prophecy ions against multiple types of malware, such as ransomware, cryptomalware, Trojans, and other malware

A

Antimalware

24
Q

A protocol that forgets everything that occurs between browser client and the server

A

Stateless protocol

25
Q

A protocol that remembers everything that occurs between browser client and the server

A

Stateful protocol

26
Q

A cookie that is only sent to the server with an encrypted request over the secure HTTPS protocol

A

Secure cookie

27
Q

A header that can inform the browser how to function while communicating with the website

A

HTTP Response Header

28
Q

A software-based application that runs on an endpoint computer and can detect that an attack has occurred

A

Host Intrusion Detection Systems (HIDS)

29
Q

Robust tools that monitor endpoint events and take immediate action

A

Endpoint detection and response (EDR)

30
Q

Software that monitors endpoint activity to immediately block a malicious attack by following specific rules

A

Host Intrusion Detection Systems

31
Q

Patch updates for application and utility software

A

Third-party updates

32
Q

The automatic download and installation of patches as they become available

A

Auto-update

33
Q

Turning off any service that is not being used and closing any unnecessary TCP ports to enhance security

A

Disabling unnecessary ports and services

34
Q

A database that contains low-level settings used by the Windows OS and for those applications that elect to use it

A

Registry

35
Q

Requiring pre approval for an application to run or not run

A

Application whitelisting and blacklisting

36
Q

Approving in advance only specific applications to run on the OS so that any item not approved is either restricted or denied

A

Whitelisting

37
Q

Creating a list of unapproved software so that any item not on the list can run

A

Blacklisting

38
Q

A “container” in which an application can be run so that it does not impact the underlying OS

A

Sandbox

39
Q

The process that holds a suspicious document, most commonly used with email attachments

A

Quarantine