Course 2 | Play It Safe_ Flashcards

play it safe_

1
Q

An organization’s ability to manage it’s defense of critical assets, data, and react to changes.

A

Security Posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ability to maintain an organization’s everyday productivity by establishing risk disaster recovery plans.

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security domain includes:

Security Posture
Risk Mitigation
Business Continuity
Compliance
Legal Regulations
Professional and organizational ethics

A

Security and Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a section of Security and Risk Management where processes are established to secure information.

EX: Incident response, vulnerability management

A

InfoSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security domain includes:

Managing data security
Effectiveness of tools and systems
Creating processes to manage data
SIEM tools

A

Security Architecture and Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which security domain includes:

Investigating
Preventative measures

A

Security Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which security domain includes:

Secure coding practices

A

Software Development Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which step in the RMF is for managing risks before a breach occurs?

A

Prepare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which step in the RMF is for managing different ways to handle risks?

A

Categorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which step in the RMF is for managing risks by selecting what controls would handle it the best?

A

Select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which step in the RMF is for managing the controls put in place to alleviate risks?

A

Implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which step in the RMF is for managing if controls are implemented correctly?

A

Assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which step in the RMF is for managing the accountability of the risks that might exist within an organization?

A

Authorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which step in the RMF is for managing the awareness of how systems are operating?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which vulnerability lets someone bypass authentication on a Microsoft email server and run malicious code remotely without needing a password?

A

ProxyLogon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which vulnerability tricks a Windows network’s login process into letting an attacker act as a domain controller?

17
Q

Which vulnerability uses a flaw in Java’s logging library to let attackers run a malicious code from a distance?

18
Q

Which vulnerability affects Windows authentication by allowing a local attacker to request credentials and relay them for access?

A

PetitPotam

“Petit Potam” is a cute little cartoon hippopotamus in French TV from the ’90s.

The researcher who discovered the vulnerability is French and just gave it a fun nickname.

19
Q

Which vulnerability happens when there’s a lack of monitoring tools, making it hard to detect suspicious or malicious activity?

A

Security Logging and Monitoring Failures

20
Q

Which vulnerability lets attackers trick a server into making internal requests and possibly accessing data it shouldn’t?

A

Server-Side Request Forgery (SSRF)

21
Q

The process of converting data from a readable format into an encoded format.

A

Encryption

22
Q

Unique characteristics that can be used to verify a person’s identity.

A

Biometrics