Enterprise Security Capabilities Flashcards
Which term refers to a network architecture where a single firewall is used with three network interfaces to provide additional protection from outside cyber-attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet?
A. Honeynet
B. Screened subnet
C. Management VLAN
D. Bastion service
B. Screened subnet
Which security service examines operating system files, configuration files, registries, application software, and Linux system files for changes and indicators of compromise?
A. Security information and event monitoring
B. Reputation filtering
C. File integrity monitoring
D. Database activity monitoring
C. File integrity monitoring
Which IPS tuning scenario involves an error state occurring when an action is taken by the sensor?
A. False positive
B. False negative
C. True positive
D. True negative
A. False positive
Which security service evolved from early HIDS solutions and involves a “lighter” software agent installed on the host systems to detect and investigate suspicious activities on host endpoints?
A. Database activity monitors (DAM)
B. Intrusion detection systems (IDS)
C. Endpoint detection and response (EDR)
D. File integrity monitoring (FIM)
C. Endpoint detection and response (EDR)
Which internet service facilitates signature validation authentication using additional extensible record types?
A. IPsec IPv6
B. DNSSEC
C. OpenDNS
D. TLS 1.3
B. DNSSEC
Which is an open standard that introduces a method to prevent sender address forgery by protecting the envelope sender address, which is used for message delivery?
A. DNSSEC
B. OpenDNS
C. SPF
D. SNMPv3
D. SNMPv3
Which port does LDAPS use?
A. 636
B. 993
C. 443
D. 389
A. 636
Which initiative is typically supported by IEEE 802.1X port-based network access control (PNAC) on Layer 2 and Layer 3 networks?
A. Network admission control (NAC)
B. Privilege access management (PAM)
C. Virtual private networking (VPN)
D. DomainKeys identified mail (DKIM)
A. Network admission control (NAC)
Which are common solutions that can contribute to a data loss prevention initiative?
A. Cloud access security brokers (CASB)
B. Intrusion detection systems (IDS)
C. Secure email gateways (SEG)
D. Database activity monitors (DAM)
E. Endpoint detection and response (EDR)
F. Access control lists (ACL)
A. Cloud access security brokers (CASB)
C. Secure email gateways (SEG)
D. Database activity monitors (DAM)
E. Endpoint detection and response (EDR)
Which is an application layer gateway server or service (physical or virtual) dedicated to analysis and control of HTTP and HTTPS traffic?
A. Web filter
B. Reputation filter
C. Jump server
D. Spam filter
A. Web filter
Which is a Microsoft Windows service that enables IT administrators to centrally manage and configure the operating system settings, applications, browsers, and user settings?
A. SELinux
B. Active Directory
C. Kerberos
D. Group Policy
D. Group Policy