D P7-9 Flashcards

1
Q

Identity and Authentication
A. Adaptive identity
B. Non-repudiation
C. Authentication
D. Access logs

A

Adaptive Identity: A dynamic authentication method that adjusts security levels based on user behavior or context.

Non-repudiation: Assurance that an entity cannot deny the authenticity of their actions, such as sending a message or signing a document.

Authentication: The process of verifying a user’s identity to grant access.

Access Logs: Records of user access events, providing a trail for monitoring and auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Auditing and Compliance
A. Automation
B. Compliance checklist
C. Attestation
D. Manual audit

A

Automation: Using scripts or tools to perform tasks automatically, reducing human intervention.

Compliance Checklist: A predefined list of requirements to ensure adherence to regulations or standards.

Attestation: A formal declaration or certification that a process or system complies with requirements.

Manual Audit: A human-led review of systems or processes to ensure compliance or identify issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Tools
A. SCAP
B. NetFlow
C. Antivirus
D. DLP

A

SCAP (Security Content Automation Protocol): A framework for automating vulnerability management and policy compliance.

NetFlow: A network protocol for collecting and analyzing IP traffic data.

Antivirus: Software that detects, prevents, and removes malicious software.

DLP (Data Loss Prevention): Solutions that protect sensitive data from being shared or accessed without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data and System Management
A. Tuning
B. Aggregating
C. Quarantining
D. Archiving

A

Tuning: Adjusting system settings to improve performance or security.

Aggregating: Combining data from multiple sources for centralized analysis.

Quarantining: Isolating a file, device, or user to prevent the spread of potential threats.

Archiving: Storing data for long-term retention, often for compliance or historical purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Emerging Technologies
A. Serverless framework
B. Type 1 hypervisor
C. SD-WAN
D. SDN

A

Emerging Technologies

Serverless Framework: A cloud computing model where applications run without managing underlying infrastructure.

Type 1 Hypervisor: Virtualization software running directly on hardware to host virtual machines.

SD-WAN (Software-Defined Wide Area Network): A network management approach that uses software to control WAN connections.

SDN (Software-Defined Networking): Network architecture that uses software for centralized control of network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Controls
A. Corrective
B. Preventive
C. Detective
D. Deterrent

A

Corrective: Actions taken to restore systems or mitigate damage after an incident.

Preventive: Measures implemented to stop security threats before they occur.

Detective: Tools or methods that identify and alert on suspicious activities.

Deterrent: Mechanisms designed to discourage malicious activity through visible warnings or obstacles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IT Processes
A. Guard rail script
B. Ticketing workflow
C. Escalation script
D. User provisioning script

A

Guard Rail Script: Automated scripts to enforce predefined limits or configurations.

Ticketing Workflow: Systems for tracking and managing support or change requests.

Escalation Script: Procedures for escalating issues to higher authority or expertise levels.

User Provisioning Script: Automated scripts for creating or managing user accounts and access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk and Network Management
A. Compensating control
B. Network segmentation
C. Transfer of risk
D. SNMP traps

A

Compensating Control: Security measures implemented to satisfy compliance when primary controls are not feasible.

Network Segmentation: Dividing a network into smaller segments to improve security and control traffic.

Transfer of Risk: Shifting risk to another entity, often through insurance or outsourcing.

SNMP Traps: Alerts sent by network devices to notify administrators of specific events or issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secure Development Practices
A. Identify embedded keys
B. Code debugging
C. Input validation
D. Static code analysis

A

Identify Embedded Keys: Detecting hard-coded keys within software for security analysis.

Code Debugging: Identifying and fixing errors or vulnerabilities in code.

Input Validation: Ensuring user inputs meet specific criteria to prevent attacks like SQL injection.

Static Code Analysis: Reviewing source code for vulnerabilities without executing the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

High Availability and Resilience
A. Clustering servers
B. Geographic dispersion
C. Load balancers
D. Off-site backups

A

Clustering Servers: Grouping servers to improve availability and balance workloads.

Geographic Dispersion: Distributing systems or resources across multiple locations to reduce risk.

Load Balancers: Distributing network or application traffic across multiple servers.

Off-Site Backups: Storing backups in a separate physical location to ensure recovery after disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly