Flashcards

1
Q

Cloud-related threats

A

access control, data loss, insider threat mitigation (AUB), email security and malware protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is user access?

A

legit and malicious user activity while they are trying to access your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Suspected Bot Attack examples

A

User login from suspicious location; abnormal login pattern; multiple login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Abnormal Admin Activity example

A

Abnormal user activity while using your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware in Cloud Drive explanation

A

persistent and transient threats (malware and ransomware) at your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware activity (service threat)

A

A user uploads files that might be infected with a virus or other malwares to the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Suspicious Ransomware Activity

A

A user up-loads to the cloud service files that might be locked by a ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email Anti-phishing

A

Mitigates phishing emails sent to your cloud email services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Abnormal sender (email anti-phishing)

A

email sender tries to impersonate a legit or well-known sender or domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Suspicious embedded content (email anti-phishing)

A

email includes suspicious links, embedded content or attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware on Endpoint

A

Mitigates the risks associated with vulnerable and infected devices that are used to access your cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UAC

A

User access control is a mandatory access control enforcement feature introduced w/ Microsoft Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 main domains

A

email, cloud applications, data, end point security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCPA (California Consumer Privacy Act)

A

aimed to enhance privacy rights and consumer protection for residents in the state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CCPA company criteria

A
  1. Gross annual revenue over $25M
  2. Annually purchases or receives for commercial purposes, or sells or shares for commercial purposes, personal information for 50,000 or more consumers, households, or devices in the state of California.
  3. Or generates 50 percent or more of their annual gross revenue from selling personal information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

API

A

Automatic programming interface; allows applications to speak with each other

16
Q

Proxy server / proxy-based

A

intermediary server separating end-user clients from the destinations that they browse

17
Q

Honeypot

A

Fake something - typically WiFi

18
Q

Domain: Email - what is Coro protecting?

A

attachments, body, addresses, phishing, malware

19
Q

Domain: Data - what is Coro protecting?

A

Business data, Data integrity, DLP, Data in motion, Data at rest

20
Q

Domain: Cloud Apps - what is Coro protecting

A

O365, Gsuite, Dropbox, Slack, SF - Anomalous login/access, Malware, Ransomware, Insider threat protection/abnormal user behavior

21
Q

Domain: Endpoints - what is Coro protecting

A

Laptops, desktops, mobile, Wi-Fi phishing, vulnerability scanning, Anti-malware

22
Q

Coro Anti-malware

A

Powered by Bit-Defender

23
Q

Email phishing: what can Coro do?

A

Identify email address, display name, domain, analyze body of text

24
Q

VPN

A

Virtual Private Network - extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network

25
Q

PCI

A

payment card industry/information

26
Q

PII

A

Personal identifiable information

27
Q

CASB

A

Cloud app security

28
Q

Widget based approach

A

Add-on’s to software platform

29
Q

SIEM

A

Security Information Event Monitoring/management, aggregation and correlation of all devices

30
Q

Types of PII

A

Name, alias, postal address, IP address, email address, bank account number, SSN, Drivers license, Passport

31
Q

Darktrace - biggest difference

A

Biggest difference: pricing

32
Q

PHI

A

protected health information

33
Q

Geofencing

A

perimeter around device

34
Q

BYOD

A

Bring your own device; we protect access to the data on those devices

35
Q

spear phishing

A

hacker will target someone specifically