Chapter 9 Flashcards

1
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BC

A

Business Continuity ??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIDR

A

Classless Inter Domain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DR

A

Disaster Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DRM

A

Digital Rights Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Enterprise Networking?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of an enterprise security architect?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are network diagrams important for cybersecurity professionals?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is baselining important?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify IPv4 addresses as: Class A, Class B, Class C, Class D, Class E, APIPA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Broadcast, Loop and Private

A

Loopback 127.x.x.x, Broadcast 255.x.x.x, APIPA 169.254.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of a subnet mask?

A

Its used to divide an ip address into two parts

19
Q

What is CIDR?

A
20
Q

What is the purpose of Business Continuity?

A
21
Q

Whats is the purpose of Disaster Recovery?

A
22
Q

Cold sites, Warm Sites and Hot Sites?

A

Cold: has the basic environmental controls necessary to operate but few of the computing components necessary for processing. Warm: Partially configured usually having the peripherals and software but perhaps not the more expensive main processing computer. Hot: Fully configured environment similar to the normal operating environment that can be operational immediately.

23
Q

What is data sovereignity?

A
24
Q

What is purpose of Standard Naming Conventions?

A
25
Q

Why do enterprises adopt standard naming conventions?

A
26
Q

Why are benchmarks such as those provided by CIS important for cybersecurity professionals?

A
27
Q

What is DRM?

A
28
Q

How does TLS/SSL provide security?

A
29
Q

How can a security professional protect data at rest?

A
30
Q

Why don’t all organizations use encryption to protect data at rest? Do not list cost as an answer.

A
31
Q

How can a security professional protect data in transit?

A
32
Q

How can a security professional protect data in use (Processing)

A
33
Q

How do the following help provide data security?

A
34
Q

Baselining

A
35
Q

Data Masking

A

Data masking is a way to create a fake, but a realistic version of your organizational data.

36
Q

DLP

A

The practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data.

37
Q

DNS Sinkholes

A

DNS sinkhole or black hole DNS is used to spoof DNS servers to prevent resolving hostnames of specified URLs.

38
Q

Encryption

A

Encrypted DNS traffic is a type of DNS traffic secured in a way that no third party can intervene during a DNS resolution

39
Q

Fake Telemetry

A

Fake Network Traffic

40
Q

Hashing

A

Hashing is the process of transforming any given key or a string of characters into another value.

41
Q

Honeyfiles

A

Fake file

42
Q

Honeynets

A

Fake Network

43
Q

Honeypots

A
44
Q

Tokenization

A