Lynda Notes 2 Flashcards

1
Q

Anomaly Analysis

A

Looks for data points that stand out from the rest of the data as clear outliers (AKA Heuristic Analysis)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trend Analysis

A

Looks for historical data over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Behavioral Analysis

A

Looks at the user behavior to detect suspicious or unusual user activity, Signatures or Heuristic Analysis could be used for this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability Analysis

A

Provides uptime information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Loss Prevention (DLP)

A

Technology solutions that search systems and monitor networks for sensitive information that is unsecured and provide the ability to remove the information, block the transmission, or encrypt the stored data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Host-based DLP

A

Uses software agents installed on a single system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network-based DLP

A

Scans network transmissions for sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two DLP Mechanisms of Action

A
  1. Pattern Matching

2. Watermarking (Electronic tagging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Watermarking

A

Electronic tags are used to identify sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Access Control (NAC)

A

Intercepts network traffic coming from unknown devices and verifies that the system and user are authorized before allowing further communication. Uses 802.1x Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Supplicant

A

Special piece of software that performs all of the NAC-related tasks on behalf of the user and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NAC Roles

A
  1. User and Device Authentication
  2. Role based access (provides access to networks where needed)
  3. Posture Checking (Makes sure the device meets security requirements)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NAC Posture Checking

A
  1. Verifying Antivirus software present
  2. Validating current signatures
  3. Ensuring proper firewall settings
  4. Verifying presence of security patches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quarantine network

A

Where NAC places a device that does not pass the Posture Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three types of NAC

A
  1. Persistent Agent - Time consuming - NAC is permanently installed on endpoint devices
  2. Dissolvable Agent - NAC software downloaded from a portal for temporary endpoint use - removed once the NAC process is complete.
  3. Agentless - NAC systems that don’t require installation of agent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mail Gateway Actions

A
  1. Allows a message to be sent
  2. Block or quarantine a message
  3. Tag the message with a warning to the recipient is suspicious
  4. Encrypt the message
17
Q

Mail Gateway Filtering

A
  1. Text Analysis
  2. Signature Detection
  3. URL Filtering
18
Q

Steganography

A

Hiding information within other information

19
Q

tcpdump

A

Open-Source command line packet sniffing tool

20
Q

Two most commonly used packet sniffers (Protocol Analyzers)

A

Wireshark and tcpdump

21
Q

Most common network mapping tool

A

nMap

22
Q

Metasploit

A

Most common exploitation framework - uses modular plugins

23
Q

ICMP

A

Internet Control Message Protocol

24
Q

ARP

A

Address Resolution Protocol - Translates IP addresses at the network layer and MAC addresses at the Ethernet layer. (Only works on local networks)

25
Q

netstat

A

Shows connections active on a system (ss on Linux systems is the equivalent)

26
Q

nc command

A

Opens raw network connections on Mac and Linux. You can send and receive raw text on a network connection

27
Q

dig

A

Command used to perform domain lookups on Mac and Linux systems (nslookup is the equivalent on Windows)

28
Q

nslookup

A

Performs DNS lookups on Windows systems

29
Q

Whois

A

Discovers ownership information about domains and IP addresses

30
Q

Reverse Whois

A

Discovers domains associated with a name or email address

31
Q

CER (Canonical Encoding Rules)

A

Files are stored as ASCII files

32
Q

DER (Distinguished Encoding Rules)

A

Files are stored as binary files

33
Q

Difference between an HSM and TPM

A

HSMs (Hardware Security Module) is a removable or external device, TPMs (Trusted Platform Module) is an embedded chip in the motherboard. TPMs cannot be added at a later date.

34
Q

Similarities of an HSM and TPM

A

Both HSM and TPM provide secure encryption capabilities by storing and using RSA keys.

35
Q

HSA (Hardware Security Module)

A

Removable or external device that can generate, store , and manage RSA keys used in asymmetric encryption. Server-based applications use an HSM to protect keys