CHP 10 Flashcards
MBSA
Microsoft Baseline Security Analyzer (MBSA) is a software tool provided by Microsoft to help administrators and users assess the security state of Windows systems and identify missing security updates and common security misconfigurations.
fact
XDR provides a comprehensive view of information technology resources to more effectively identify threats and enable faster responses.
FIM
File Integrity Monitoring (FIM) is a security process that involves monitoring and detecting changes to files and system configurations. It helps ensure that critical files have not been altered by unauthorized users, malicious software, or system errors.
SFC
System File Checker (SFC)
UEBA
user and entity behavior analytics (UEBA)
A system that can provide automated identification of suspicious activity by user accounts and computer hosts.
PoLP
principle of least privilege (PoLP)
ACE
An Access Control Entry (ACE) is a component of an Access Control List (ACL) that defines the permissions granted or denied to a user or group for a specific resource in a computer system. Each ACE specifies a particular access right for a given user or group.
ICS
Industrial control systems (ICS)
ad hoc network
An ad hoc network is a type of wireless network where nodes (devices) communicate directly with each other without relying on a fixed infrastructure like routers or access points. These networks are typically temporary and set up for specific purposes.
BSC
Bluetooth Secure Connections (BSC)
Introduced in Bluetooth 4.0, BSC offers increased resistance against eavesdropping, on-path attacks, and unauthorized access.
BLE
Bluetooth Low Energy (BLE) Privacy
BLE is a power-efficient version of Bluetooth that uses randomly generated device addresses that periodically change to prevent tracking and unauthorized identification of BLE devices.
Which intrusion detection method involves the analysis engine trained to recognize baseline “normal” traffic and generates an incident when it detects deviations from this baseline?
A.Signature-based detection
B.Behavioral- and anomaly-based detection
C.Trend analysis
D.Network traffic analysis (NTA)
B