Enterprise Security Capabilities Flashcards

1
Q

Which term refers to a network architecture where a single firewall is used with three network interfaces to provide additional protection from outside cyber-attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet?
A. Honeynet
B. Screened subnet
C. Management VLAN
D. Bastion service

A

B. Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Which security service examines operating system files, configuration files, registries, application software, and Linux system files for changes and indicators of compromise?
A. Security information and event monitoring
B. Reputation filtering
C. File integrity monitoring
D. Database activity monitoring

A

C. File integrity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IPS tuning scenario involves an error state occurring when an action is taken by the sensor?
A. False positive
B. False negative
C. True positive
D. True negative

A

A. False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security service evolved from early HIDS solutions and involves a “lighter” software agent installed on the host systems to detect and investigate suspicious activities on host endpoints?
A. Database activity monitors (DAM)
B. Intrusion detection systems (IDS)
C. Endpoint detection and response (EDR)
D. File integrity monitoring (FIM)

A

C. Endpoint detection and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which internet service facilitates signature validation authentication using additional extensible record types?
A. IPsec IPv6
B. DNSSEC
C. OpenDNS
D. TLS 1.3

A

B. DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is an open standard that introduces a method to prevent sender address forgery by protecting the envelope sender address, which is used for message delivery?
A. DNSSEC
B. OpenDNS
C. SPF
D. SNMPv3

A

D. SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which port does LDAPS use?
A. 636
B. 993
C. 443
D. 389

A

A. 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which initiative is typically supported by IEEE 802.1X port-based network access control (PNAC) on Layer 2 and Layer 3 networks?
A. Network admission control (NAC)
B. Privilege access management (PAM)
C. Virtual private networking (VPN)
D. DomainKeys identified mail (DKIM)

A

A. Network admission control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which are common solutions that can contribute to a data loss prevention initiative?
A. Cloud access security brokers (CASB)
B. Intrusion detection systems (IDS)
C. Secure email gateways (SEG)
D. Database activity monitors (DAM)
E. Endpoint detection and response (EDR)
F. Access control lists (ACL)

A

A. Cloud access security brokers (CASB)
C. Secure email gateways (SEG)
D. Database activity monitors (DAM)
E. Endpoint detection and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is an application layer gateway server or service (physical or virtual) dedicated to analysis and control of HTTP and HTTPS traffic?
A. Web filter
B. Reputation filter
C. Jump server
D. Spam filter

A

A. Web filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is a Microsoft Windows service that enables IT administrators to centrally manage and configure the operating system settings, applications, browsers, and user settings?
A. SELinux
B. Active Directory
C. Kerberos
D. Group Policy

A

D. Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly