CHP 10 Flashcards

1
Q

MBSA

A

Microsoft Baseline Security Analyzer (MBSA) is a software tool provided by Microsoft to help administrators and users assess the security state of Windows systems and identify missing security updates and common security misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

fact

A

XDR provides a comprehensive view of information technology resources to more effectively identify threats and enable faster responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FIM

A

File Integrity Monitoring (FIM) is a security process that involves monitoring and detecting changes to files and system configurations. It helps ensure that critical files have not been altered by unauthorized users, malicious software, or system errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SFC

A

System File Checker (SFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEBA

A

user and entity behavior analytics (UEBA)
A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PoLP

A

principle of least privilege (PoLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACE

A

An Access Control Entry (ACE) is a component of an Access Control List (ACL) that defines the permissions granted or denied to a user or group for a specific resource in a computer system. Each ACE specifies a particular access right for a given user or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICS

A

Industrial control systems (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ad hoc network

A

An ad hoc network is a type of wireless network where nodes (devices) communicate directly with each other without relying on a fixed infrastructure like routers or access points. These networks are typically temporary and set up for specific purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BSC

A

Bluetooth Secure Connections (BSC)
Introduced in Bluetooth 4.0, BSC offers increased resistance against eavesdropping, on-path attacks, and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BLE

A

Bluetooth Low Energy (BLE) Privacy
BLE is a power-efficient version of Bluetooth that uses randomly generated device addresses that periodically change to prevent tracking and unauthorized identification of BLE devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which intrusion detection method involves the analysis engine trained to recognize baseline “normal” traffic and generates an incident when it detects deviations from this baseline?

A.Signature-based detection
B.Behavioral- and anomaly-based detection
C.Trend analysis
D.Network traffic analysis (NTA)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly