host and application security solutions Flashcards

1
Q

A _____is also software located on the host system. It can log and notify admins or users about intrusion attempts without an active response, like denying or blocking.

A

Host-based Intrusion Detection System (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ means that all or part of the data in a field is replaced with a randomly generated token or number.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ verifies application code has not been modified by the use of digital signatures

A

Code signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ occur when multiple applications attempt to access the same resource at the same time causing a conflict.

A

Race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is a dynamic analysis technique that checks code as it is running. When using _____, the system is attacked with random data to check for code vulnerabilities.

A

Fuzzing - also known as Dynamic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____ examines code quality and effectiveness without executing the code

A

static code analyzer

An analyzer can be used in conjunction with development for continued code quality checks, or once the code is in its finalization stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ allows the merging of code changes into a central repository. The code is built and tested each time it is checked into the environment, providing a more efficient method to code production.

A

Continuous integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ attempts to simulate a production environment and focuses on the objective and threshold that an application can handle while maintaining performance.

A

Stress testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A trusted, or _____ process uses the trusted platform module (TPM) at each stage in the boot process to check hashes of key system state data, which then uses an attestation process to verify if the system has not been tampered with.

A

measured boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An _____ product provides real-time and historical visibility into the compromise, contains the malware, and facilitates remediation of the host to its original state.

A

endpoint detection and response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ provide threat detection and prevent those threats based on signature values, heuristic behaviors, and security policies.

A

Host intrusion prevention systems (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a specification for a software program that connects a computer’s firmware to its operating system

A

Unified Extensible Firmware Interface (UEFI)

UEFI is the replacement for Basic Input/Output System (BIOS) and has many advancements to include provisions for secure booting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _____ is firmware used to manipulate settings on a system. It provides basic instructions on how a system should start up.

A

Basic Input/Output System (BIOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is the process of checking and validating system files during a boot process.

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ includes both the hardware and software to encrypt data on a drive. Keys are securely stored within for decryption. ___ requires credentials to be entered for decryption.

A

self-encrypting drive (SED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ provides encryption for a whole disk and protects the confidentiality of the data.

A

Full disk encryption (FDE)

17
Q

_____ are radio frequencies emitted by external sources, such as power lines that disturb signals.

A

Electromagnetic interference (EMI)

EMI can be avoided by the use of shielding.

18
Q

The _____ environment mimics that of production and allows for an environment to practice deployment

A

staging

19
Q

The _____ environment is the final stage of the deployment effort. Testing in this environment would be too late, given it is the operational environment.

A

production

20
Q

The _____ environment is a place for creation. Requirements are turned into reality in this environment. It is not a complete copy of production, but just the beginning of an application.

A

development