Domain 7 - Security Operations Flashcards

1
Q

Acoustic Sensors

A

Device that uses passive listening devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrator accounts

A

Accounts that are assigned only to named individuals that require administrative access to the system to perform maintenance activities, and should be different and separate from a user’s normal account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Balanced Magnetic Switch (BMS)

A

Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of custody

A

The who, what, when, where, and how the evidence was handled?from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning ot owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cipher Lock

A

A lock controlled by touch screen, typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration management (CM)

A

A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Leak Prevention (DLP)

A

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Egress filtering

A

The practice of monitoring and potentially restricting the flow of information outbound from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infrared Linear Beam Sensors

A

A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Instant Keys

A

Provide a quick way to disable a key by permitting one turn of the master key to change a lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion Detection System (IDS)

A

A technology that alerts organizations to adverse or unwanted activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Indemnification

A

The party to party litigation costs resulting from its breach of warranties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion Prevention System (IPS)

A

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Decoy servers or systems setup to gather information regarding an attacker or intruder into your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeyfarm

A

A centralized collection of honeypots and analysis tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeynet

A

Two or more honeypots on a network

17
Q

Live evidence

A

Data that are dynamic and exist in running processes or other volatile locations (e.g., system/device RAM) that disappear in a relatively short time once the system is powered down

18
Q

Locard’s exchange principle

A

States that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange

19
Q

Magnetic Stripe (mag stripe) cards

A

Consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card

20
Q

Mortise Lock

A

A lock or latch that is recessed into the edge of a door, rather than being mounted to its surface.

21
Q

Power users

A

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required

22
Q

Protocol Anomaly-Based IDS

A

Identifies any unacceptable deviation from expected behavior based on known network protocols

23
Q

Proximity Card (prox cards)

A

Use embedded antenna wires connected to a chip within the card through RF.

24
Q

Records and Information Management (RIM)

A

Essential activities to protect business information and can be established in compliance with laws, regulations, or corporate governance

25
Q

Remanence

A

The measure of the existing magnetic field on the media after degaussing

26
Q

Rim Lock

A

A lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock

27
Q

Sandboxing

A

A form of software virtualization that lets programs and processes run in their own isolated virtual environment

28
Q

Security Informatn and Event Management (SIEM)

A

A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation

29
Q

Service accounts

A

Accounts used to provide privileged access used by system services and core applications

30
Q

Smart Cards

A

Credential cards with one or more microchip processing that accepts or processes infomraiton and can be contact or contact less.

31
Q

Statistical Anomaly-based IDS

A

Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches

32
Q

Steganography

A

The science of hiding information

33
Q

Traffic anomaly-based IDS

A

Identifies any unacceptable deviation from expected behavior based on actual traffic structure

34
Q

Time domain Reflectometry (TDR)

A

Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric