Memorize Flashcards

1
Q

DSM (regarding data)

A

Data Services Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOAR

A

Security Orchestration, Automation, Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FPE (data protection)

A

Format Preserving Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VRF (networking)

A

Virtual Routing and Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTD

A

Firepower Threat Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISE

A

Identity Services Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AIA

A

Authority Information Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DRS (re: data)

A

Designated Record Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISL

A

Integration Services Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRI-O

A

an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative compatible runtimes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FISMA

A

Federal Information Security Modernization Act
Enacted in 2002 - mandates a process to security posture of federal government.
Name change from management to modernization in 2014.
Codifies DHS authority to develop and oversee implementation of binding operational directives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CISA

A

Cybersecurity & Infrastructure Security Agency
Federal agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST SP 800-190

A

Application Container Security Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FISMA compliance most often refers to?

A

meeting controls identified in SP 800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST SP 800-37

A

describes Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMART Goals

A

Specific Measurable Attainable Relevant Time-bound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 functions in CSF

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Layers of CSF (levels of hierarchy)

A

Function (5)
Category (23)
Subcategory (108)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ID.AM-1

A

Physical devices and systems within the organization are inventoried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ID.AM-2

A

Software platforms and applications within the organization are inventoried

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ID.AM-3

A

Organizational communication and data flows are mapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ID.AM-4

A

External information systems are catalogued

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ID.AM-5

A

Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ID.AM-6
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
26
CSF: Categories of Identify
Asset Managment Business Environment Governance Risk Assessment Risk Management Strategy Supply Chain Risk Management
27
HIPAA
Health Insurance Portability and Accountability Act
28
VPC
Virtual Private Cloud
29
ARN
Amazon Resource Name
30
ECS
Elastic Container Service
31
ELB
Elastic Load Balancer
32
CORS
Cross-Origin Resource Sharing
33
SGT
Security Group Tag
34
ADM (re: architecture framework)
Architecture Development Method The core of TOGAF Proven way of developing an architecture Iterative
35
ACF (RE: architecture frameworks)
Architecture Content Framework Deliverables, artifacts, building blocks
36
The Enterprise Continuum
The Architecture Repository
37
ABBs
Architectural Building Blocks
38
Togaf TRM
Technical Reference Model
39
HKS
Hitachi Kubernetes Service
40
HKE
Hitachi Kubernetes Engine
41
NIST Zero Trust SP
SP 800-207
42
PEP (ZT)
Policy Enforcement Point
43
PDP (ZT)
Policy Decision Point
44
PDP is broken into what two components
Policy Engine and Policy Administrator
45
IGP (around Authn)
Identity Governance Program
46
PE/PA (ZTA)
Policy Engine/Policy Administrator
47
CMDB lead
Mahesh Mukka
48
HV vision
To deliver data-driven solutions for commercial and industrial enterprises To capitalize on Hitachi's social innovation capability in both operational technologies (OT) and information technologies (IT).
49
Hitachi Credo
Contribute to society through the development of superior, original technology and products
50
SANS Top 20 CSC 1
Inventory of Authorized and Unauthorized devices
51
SANS Top 20 CSC 2
Inventory of Authorized and Unauthorized software
52
TPRM
Third Party Risk Management
53
Wa
harmony, trust, respect
54
Makoto
Sincerity, Fairness, Honesty, Integrity
55
Kaitakusha-Seishin
Pioneering Spirit, Challenge
56
VMDR
Vulnerability Management Detection and Response
57
Zero Trust Tenets
*Identity - User identity, Device Identity, User Analytics *Applications - Catalog, Entitlements, Logging *Enforcement - Policy Engine Segmentation, Encryption *Enrichment - Threat Intelligence, Network Analytics, Automation
58
RFO
Reason for Outage
59
Aditya
Choppara Network Operations Engineer India Reports to Ibrahim Anchal
60
Ankit
Yadav IT Infrastructure Engineer (VMware) Colorado Reports to Hari Kumar Nadipalli
61
HV data classification
Public, confidential, restricted
62
HRO
Hitachi Remote Operations
63
Global COE Presales person
Will Edds
64
Will Edds Postion Time Zone
Global COE Presales Eastern Time (PT+3)
65
Qualys person
Francisco Contreras
66
Sylwia Jedrzejczyk position time zone
Threat and Vulnerability Management Krakow, Poland (pt + 9h)
67
Threat and Vulnerability Management Person
Sylwia Jedrzejczyk
68
CSVS
OWASP Container Security Verification Standard
69
DEVOPS cycle
Plan Code Build Test Release Deploy Operate Monitor
70
Management areas
Strategy Coordination Resource Allocation Objectives
71
Windows Server Administrator
Ravikiran Dushetti
72
Ravikiran Dushetti
Windows Server Administrator
73
LSH (HV Product)
Lumada Solution Hub
74
Configuration Compliance policy (Is this HV Policy doc#?)
CO-07.2
75
DORA (regulation)
Digital Operational Resilience ACT The Digital Operational Resilience Act, or DORA, is a European Union (EU) regulation that creates a binding, comprehensive information and communication technology (ICT) risk management framework for the EU financial sector.
76
Security by Design
Security is considered at every step from requirements to deployment.
77
Risk Mitigation choices
Reduce Avoid Transfer Accept Reject
78
Threats
Intentions with capability
79
Risk
Most often measured based on Probability and Impact
80
Risk Assessment
Risk Assessment involves identification of risk through analysis of assets, threats and vulnerabilities, including their impacts and likelihood.
81
Threat modeling (focus)
Threat modeling primarily focuses on data assets and involves systematically identifying the potential risks and vulnerabilities which are exploitable but from an attackers viewpoint
82
Risk focus
event focused
83
Threats focus
intentions
84
STRIDE
Spoofing Tampering Repudiation Information Disclosure Denial of Service Escalation of Privileges
85
Threats are addressed by:
Mitigation Elimination Transference Acceptance
86
DREAD is used for?
Assess, analyze, and find probability of risk by rating the threats
87
DREAD
Damage Reproducibility Exploitability Affected users Discoverability
88
CSOD
Related to our training system
89
HMAC
Hash-based Message Authentication Codes
90
AWS RDS
Amazon Relational Database Service
91
92
Ben Jones
Legal - Senior Counsel
93
legal contact
Ben Jones
94
95
Curt McAdams
Sr Mgr of Enterprise Data Governance
96
Enterprise Data Governance Senior Manager
Curt McAdams
97