Memorize Flashcards

1
Q

DSM (regarding data)

A

Data Services Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOAR

A

Security Orchestration, Automation, Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FPE (data protection)

A

Format Preserving Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VRF (networking)

A

Virtual Routing and Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTD

A

Firepower Threat Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISE

A

Identity Services Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIA

A

Authority Information Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DRS (re: data)

A

Designated Record Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISL

A

Integration Services Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRI-O

A

an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative compatible runtimes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FISMA

A

Federal Information Security Modernization Act
Enacted in 2002 - mandates a process to security posture of federal government.
Name change from management to modernization in 2014.
Codifies DHS authority to develop and oversee implementation of binding operational directives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CISA

A

Cybersecurity & Infrastructure Security Agency
Federal agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST SP 800-190

A

Application Container Security Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FISMA compliance most often refers to?

A

meeting controls identified in SP 800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST SP 800-37

A

describes Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMART Goals

A

Specific Measurable Attainable Relevant Time-bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 functions in CSF

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Layers of CSF (levels of hierarchy)

A

Function (5)
Category (23)
Subcategory (108)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ID.AM-1

A

Physical devices and systems within the organization are inventoried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ID.AM-2

A

Software platforms and applications within the organization are inventoried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ID.AM-3

A

Organizational communication and data flows are mapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ID.AM-4

A

External information systems are catalogued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ID.AM-5

A

Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ID.AM-6

A

Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CSF: Categories of Identify

A

Asset Managment
Business Environment
Governance
Risk Assessment
Risk Management Strategy
Supply Chain Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

VPC

A

Virtual Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ARN

A

Amazon Resource Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ECS

A

Elastic Container Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

ELB

A

Elastic Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CORS

A

Cross-Origin Resource Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SGT

A

Security Group Tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ADM (re: architecture framework)

A

Architecture Development Method
The core of TOGAF
Proven way of developing an architecture
Iterative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ACF (RE: architecture frameworks)

A

Architecture Content Framework
Deliverables, artifacts, building blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The Enterprise Continuum

A

The Architecture Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ABBs

A

Architectural Building Blocks

38
Q

Togaf TRM

A

Technical Reference Model

39
Q

HKS

A

Hitachi Kubernetes Service

40
Q

HKE

A

Hitachi Kubernetes Engine

41
Q

NIST Zero Trust SP

A

SP 800-207

42
Q

PEP (ZT)

A

Policy Enforcement Point

43
Q

PDP (ZT)

A

Policy Decision Point

44
Q

PDP is broken into what two components

A

Policy Engine and Policy Administrator

45
Q

IGP (around Authn)

A

Identity Governance Program

46
Q

PE/PA (ZTA)

A

Policy Engine/Policy Administrator

47
Q

CMDB lead

A

Mahesh Mukka

48
Q

HV vision

A

To deliver data-driven solutions for commercial and industrial enterprises

To capitalize on Hitachi’s social innovation capability in both operational technologies (OT) and information technologies (IT).

49
Q

Hitachi Credo

A

Contribute to society through the development of superior, original technology and products

50
Q

SANS Top 20 CSC 1

A

Inventory of Authorized and Unauthorized devices

51
Q

SANS Top 20 CSC 2

A

Inventory of Authorized and Unauthorized software

52
Q

TPRM

A

Third Party Risk Management

53
Q

Wa

A

harmony, trust, respect

54
Q

Makoto

A

Sincerity, Fairness, Honesty, Integrity

55
Q

Kaitakusha-Seishin

A

Pioneering Spirit, Challenge

56
Q

VMDR

A

Vulnerability Management Detection and Response

57
Q

Zero Trust Tenets

A

*Identity - User identity, Device Identity, User Analytics
*Applications - Catalog, Entitlements, Logging
*Enforcement - Policy Engine Segmentation, Encryption
*Enrichment - Threat Intelligence, Network Analytics, Automation

58
Q

RFO

A

Reason for Outage

59
Q

Aditya

A

Choppara
Network Operations Engineer
India
Reports to Ibrahim Anchal

60
Q

Ankit

A

Yadav
IT Infrastructure Engineer (VMware)
Colorado
Reports to Hari Kumar Nadipalli

61
Q

HV data classification

A

Public, confidential, restricted

62
Q

HRO

A

Hitachi Remote Operations

63
Q

Global COE Presales person

A

Will Edds

64
Q

Will Edds
Postion
Time Zone

A

Global COE Presales
Eastern Time (PT+3)

65
Q

Qualys person

A

Francisco Contreras

66
Q

Sylwia Jedrzejczyk
position
time zone

A

Threat and Vulnerability Management
Krakow, Poland (pt + 9h)

67
Q

Threat and Vulnerability Management Person

A

Sylwia Jedrzejczyk

68
Q

CSVS

A

OWASP Container Security Verification Standard

69
Q

DEVOPS cycle

A

Plan
Code
Build
Test
Release
Deploy
Operate
Monitor

70
Q

Management areas

A

Strategy
Coordination
Resource Allocation
Objectives

71
Q

Windows Server Administrator

A

Ravikiran Dushetti

72
Q

Ravikiran Dushetti

A

Windows Server Administrator

73
Q

LSH (HV Product)

A

Lumada Solution Hub

74
Q

Configuration Compliance policy (Is this HV Policy doc#?)

A

CO-07.2

75
Q

DORA (regulation)

A

Digital Operational Resilience ACT

The Digital Operational Resilience Act, or DORA, is a European Union (EU) regulation that creates a binding, comprehensive information and communication technology (ICT) risk management framework for the EU financial sector.

76
Q

Security by Design

A

Security is considered at every step from requirements to deployment.

77
Q

Risk Mitigation choices

A

Reduce
Avoid
Transfer
Accept
Reject

78
Q

Threats

A

Intentions with capability

79
Q

Risk

A

Most often measured based on Probability and Impact

80
Q

Risk Assessment

A

Risk Assessment involves identification of risk through analysis of assets, threats and vulnerabilities, including their impacts and likelihood.

81
Q

Threat modeling (focus)

A

Threat modeling primarily focuses on data assets and involves systematically identifying the potential risks and vulnerabilities which are exploitable but from an attackers viewpoint

82
Q

Risk focus

A

event focused

83
Q

Threats focus

A

intentions

84
Q

STRIDE

A

Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Escalation of Privileges

85
Q

Threats are addressed by:

A

Mitigation
Elimination
Transference
Acceptance

86
Q

DREAD is used for?

A

Assess, analyze, and find probability of risk by rating the threats

87
Q

DREAD

A

Damage
Reproducibility
Exploitability
Affected users
Discoverability

88
Q

CSOD

A

Related to our training system

89
Q

HMAC

A

Hash-based Message Authentication Codes

90
Q

AWS RDS

A

Amazon Relational Database Service

91
Q
A