Chapter 9 Flashcards
API
Application Programming Interface
BC
Business Continuity ??
CIDR
Classless Inter Domain Routing
CIS
Center for Internet Security
DLP
Data Loss Prevention
DR
Disaster Recovery
DRM
Digital Rights Management
GDPR
General Data Protection Regulation
IP
Internet Protocol
SSL
Secure Socket Layer
TLS
Transport Layer Security
What is Enterprise Networking?
What is the role of an enterprise security architect?
Why are network diagrams important for cybersecurity professionals?
Why is baselining important?
Identify IPv4 addresses as: Class A, Class B, Class C, Class D, Class E, APIPA
Broadcast, Loop and Private
Loopback 127.x.x.x, Broadcast 255.x.x.x, APIPA 169.254.x.x
What is the purpose of a subnet mask?
Its used to divide an ip address into two parts
What is CIDR?
What is the purpose of Business Continuity?
Whats is the purpose of Disaster Recovery?
Cold sites, Warm Sites and Hot Sites?
Cold: has the basic environmental controls necessary to operate but few of the computing components necessary for processing. Warm: Partially configured usually having the peripherals and software but perhaps not the more expensive main processing computer. Hot: Fully configured environment similar to the normal operating environment that can be operational immediately.
What is data sovereignity?
What is purpose of Standard Naming Conventions?
Why do enterprises adopt standard naming conventions?
Why are benchmarks such as those provided by CIS important for cybersecurity professionals?
What is DRM?
How does TLS/SSL provide security?
How can a security professional protect data at rest?
Why don’t all organizations use encryption to protect data at rest? Do not list cost as an answer.
How can a security professional protect data in transit?
How can a security professional protect data in use (Processing)
How do the following help provide data security?
Baselining
Data Masking
Data masking is a way to create a fake, but a realistic version of your organizational data.
DLP
The practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data.
DNS Sinkholes
DNS sinkhole or black hole DNS is used to spoof DNS servers to prevent resolving hostnames of specified URLs.
Encryption
Encrypted DNS traffic is a type of DNS traffic secured in a way that no third party can intervene during a DNS resolution
Fake Telemetry
Fake Network Traffic
Hashing
Hashing is the process of transforming any given key or a string of characters into another value.
Honeyfiles
Fake file
Honeynets
Fake Network
Honeypots
Tokenization