EXAM 1 Flashcards
Passive reconnaissance
Passive reconnaissance focuses on gathering as much information from open sources such as social media, corporate websites, and business
Regulatory audit
A regulatory audit is a detailed security analysis based on existing laws or private guidelines. A regulatory audit commonly requires access to internal systems and data.
DMARC
(Domain-based Message Authentication Reporting and
Conformance) specifies the disposition of spam emails. The legitimate owner of the originating email domain can choose to have these messages accepted, sent to a spam folder, or rejected.
DKIM
DKIM (Domain Keys Identified Mail) provides a way to validate all digitally signed messages from a specific email server. DKIM does not determine how the receiving server categorizes these digitally signed
messages
What is the acronym of a predection of how often a repairable system will fail or what is the average time expected between outages.
MTBF Mean Time Between Failures
An MOA (Memorandum of Agreement)
An MOA (Memorandum of Agreement) is a formal document where both sides agree to a broad set of goals and objectives associated with the partnership.
What is a Deterrent control
A deterrent control does not directly stop an attack, but it may discourage an action; splash screen, front reception desk, warning signs.
deterrent discourages an intrusion attempt, but it doesn’t directly prevent the access. An application splash screen or posted warning sign would be categorized as a deterrent.
What is a Detective control
A detective control may not prevent access, but it can identify and record when an intrusion has occurred; for example, going through system logs and login reports, motion detectors.
An IPS can detect, alert, and log an intrusion attempt. The IPS could also be categorized as a preventive control, since it has the ability to actively
block known attacks.
What is a Directive control
A directive control is relatively weak control which relies on security compliance from the end users. Direct a user towards security compliance. “Authorized Personal Only”
COPE
A device that is COPE (Corporately Owned and Personally Enabled) is commonly purchased by the corporation and allows the use of the mobile device for both business and personal use. The use of a COPE device does not provide any policy management of the device.
What is a compensating control
Compensating controls are used to mitigate a vulnerability when an optimal security response may not be available. For example, if a company can’t deploy a patch for a vulnerability, they can revoke or limit application access until a patch is provided.
A compensating security control doesn’t prevent an attack, but it does restore from an attack using other means. In this example, the UPS (Uninterruptible Power Supply) does not stop a power outage, but it does provide alternative power if an outage occurs.
802.1X
802.1X uses a centralized authentication server, and this allows all users to use their corporate credentials during the login process.
What is Discretionary access
Discretionary access control is used in many operating systems, and this model allows the owner of the resource to control who has access.
Development lifecycle
A formal software development lifecycle defines the specific policies associated with the design, development, testing, deployment, and maintenance of the application development process.
hybrid cloud model
A hybrid cloud includes more than one private or public cloud. This adds additional complexity to the overall infrastructure, and it’s common to inadvertently apply different authentication options and user permissions
across multiple cloud providers.
A manufacturing company would like to track the progress of parts used on an assembly line
The ledger functionality of a blockchain can be used to track or verify components, digital media, votes, and other physical or digital objects.
administrator is downloading an updated version of her Linux distribution. The download site shows a link to the ISO and a SHA256 hash value, why?
Verifies that the file was not corrupted during
the file transfer Once the file is downloaded, the administrator can calculate the file’s SHA256 hash and confirm that it matches the value on the website.
What decreases threat level?
Mitigation decreases the threat level. This is commonly done through the use of additional security systems and monitoring, such as an NGFW (Next-Generation Firewall).
What is enumeration
Enumeration describes the detailed listing of all parts in a particular device. For a computer, this could include the CPU type, memory, storage drive details, keyboard model, and more.
security awareness campaign
A security awareness campaign often involves automated phishing attempts, and most campaigns will include a process for users to report a suspected phishing attempt to the IT security team.
SCAP
Automate the validation and patching of security issues
SCAP (Security Content Automation Protocol) focuses on the standardization of vulnerability management across multiple security tools. This allows different tools to identify and act on the same security criteria.
HSM
An HSM (Hardware Security Module) is a high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.