Chapter 7: Security Operations Flashcards

1
Q

Explain Parol Evidence .

A

It states that agreements made outside of a written contract are not admissible in court, unless there is evidence of fraud, duress, or a mutual mistake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Documentary Evidence .

A

Written items, whether in tangible or electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Real Evidence .

A

Physical objects that can be brought into a courtroom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a pseudoflaw ?

A

An apparent loophole or trapdoor that has been inserted into an operating system in order to trap unauthorized intruders who access a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a Honeynet ?

A

A decoy network that’s designed to lure hackers away from a main network and into a trap. Honeynets are made up of interconnected honeypots and appear to be authentic networks with valuable resources, systems, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is NetFlow ?

A

NetFlow is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. By analyzing NetFlow data, you can get a picture of network traffic flow and volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a forensic disk controller ?

A

A specialized type of computer hard disk controller made for the purpose of gaining read-only access to computer hard drives without the risk of damaging the drive’s contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Meet-in-the-middle attacks.

A

A known plaintext cryptographic attack against encryption schemes that rely on performing multiple encryption operations in sequence. The MITM attack is the primary reason why Double DES is not used and why a Triple DES key (168-bit) can be brute-forced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Entitlement ?

A

The initial set of privileges assigned to a new user by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is TOGAF ?

A

The TOGAF standard is a framework for Enterprise Architecture from The Open Group Architecture Forum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PMBOK ?

A

Project Management Body of Knowledge, a set of standard terminology and guidelines for project management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are SCOM and SCCM ?

A

System Center Operations Manager & System Center Configuration Manager. SCOM lets administrators deploy, configure, manage, & monitor operations, services, & applications. SCCM can track system inventory, provide remote control, & help administrators maintain system configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MTD ?

A

Maximum Tolerable Downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is FCRP ?

A

The Federal Rules of Civil Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is NIDS ?

A

Network Intrusion Detection System, a cybersecurity tool that monitors network traffic to identify potential cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term describes privileges accumulated after an employee has held multiple positions?

A

Aggregation

17
Q

What are the ports for FTP, SSH, and DNS?

A

20/21, 22, and 53