OP PRODUCTS Flashcards

1
Q

In the old UI

protect,
detect, and
respond

are known as what in the new UI?

A

Protect ~ Control
Detect ~ Defend
Respond ~ Alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you defined the network location?

A

By IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of the Defend product, what are it’s 3 Key features, and what does it integrate with?

A

Continuous threat monitoring

  • Real time attack alerts
  • Monitor for exploits, user activity/transactions, privilege misuse.
  • Alert for dangerous program executions

Integration with Siena:
SPLUNK, ArcSight, Radar, Exabeam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Assess policy job on the OP Platform?

A

A set of checks for system vulnerabilities or audit compliance.

*0P has a dedicated policy for each specific type of system such as SAP or Oracle EBS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What criteria must be met for OP to generate an issue occurrence?

A

Issue occurrence equal issue plus asset plus scope scope maybe system, connector, or application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between assess and comply?

A

A compliance Audit determines if your assets and here to industry regulations and internal standards. And audit contains one policy, and a policy contains a set of checks called modules that are run to assess compliance at a granular level. There are two policy types:

Standard policy provided by Onapsis, standard policies contain a set a predefined module specific to an industry standard or government mandate. You cannot modified standard policies, although you can’t clone a standard policy to create a custom policy.

Custom policy policies created by your organization. Custom policies can contain predefined modules provided by Onapsis and/or custom modules to create.

Unlike assess, which enables recurring holistic security health checks, comply is designed to give insight into how systems meet specific regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can you do in the integrations tab

A

Configure connections with third-party tools. Requires OP (old name OSP) add-on installation to third-party tools and connection from OP to third-party tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the three lines of defense model?

A

First Line = Management Responsibility for operations

Second Line = Management Responsibility for Risk Management and compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you check assets for compliance?

A

You create and run comply jobs. Comply jobs run comply policies on assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can I find configuration guides like for the ABAP add on, for the HANA role, for the SAP SuccessFactors configuration and user guide and more?

A

Onapsis platform help section > PDFs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does an exclusion group do?

A

Exclusion groups are used when creating custom policies and custom modules to exclude Specific criteria that would cause a control point to fill for example excluding security administrators from a control point for users accessing SU01.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does CAGR mean?

A

This is a good question do the research starting with markets and markets.com question comes from a slide in the boot camp assist deep dive one relating to the annual market for vulnerability management was 12.5 billion in 2020 and is expected to increase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the top three Onapsis competitors for vulnerability management and How does Onapsis vulnerability management compare with the top vulnerability management vendors?

A

Good question do the research. Top VM competitor =

1) QUALYS
2) TENABLE
3) RAPID7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How much do organization spend annually on vulnerability management

A

1.4 M

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ioT and how is it creating vulnerabilities in the market

A

ioT means “Internet of things” do you research on how this is really impacting and creating vulnerabilities in the market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What goes SOC stand for snd how does it operate within organizations

A

SOC = Security operation center. It’s not owned by IT do the research starting with wiki

17
Q

What is the RECON vulnerability?

A

Research and know this in depth

18
Q

How many licenses with Advanced Energy need for all of their sandbox Deb QA and production environments for all of the above Systems and success factors and salesforce and Hana?

A

7

The above systems are only one for the entire landscape (ie sandbox, DEV, QA, PRD, for clients 01, 66, etc…)

19
Q

SAP Hana and Fiori are ______ based applications which are written in _____ based code which has ________ as it’s underlying programming language?

A

WEB BASED applications
Written in SAP UI5
which has JAVA as its underlying programming language

20
Q

The average customer has blank lines of code with an average of blank critical while vulnerabilities per 1000 lines of code which is equal to blank critical security vulnerabilities

A

2 million Lines of code

1.1 Critical vulnerabilities per 1000 lines of code

This is equal to 2200 critical security vulnerabilities

21
Q

OP control for code can scan which systems in development?

A

ABAP, Hana, and Fiori