D P7-9 Flashcards
Identity and Authentication
A. Adaptive identity
B. Non-repudiation
C. Authentication
D. Access logs
Adaptive Identity: A dynamic authentication method that adjusts security levels based on user behavior or context.
Non-repudiation: Assurance that an entity cannot deny the authenticity of their actions, such as sending a message or signing a document.
Authentication: The process of verifying a user’s identity to grant access.
Access Logs: Records of user access events, providing a trail for monitoring and auditing.
Auditing and Compliance
A. Automation
B. Compliance checklist
C. Attestation
D. Manual audit
Automation: Using scripts or tools to perform tasks automatically, reducing human intervention.
Compliance Checklist: A predefined list of requirements to ensure adherence to regulations or standards.
Attestation: A formal declaration or certification that a process or system complies with requirements.
Manual Audit: A human-led review of systems or processes to ensure compliance or identify issues.
Security Tools
A. SCAP
B. NetFlow
C. Antivirus
D. DLP
SCAP (Security Content Automation Protocol): A framework for automating vulnerability management and policy compliance.
NetFlow: A network protocol for collecting and analyzing IP traffic data.
Antivirus: Software that detects, prevents, and removes malicious software.
DLP (Data Loss Prevention): Solutions that protect sensitive data from being shared or accessed without authorization.
Data and System Management
A. Tuning
B. Aggregating
C. Quarantining
D. Archiving
Tuning: Adjusting system settings to improve performance or security.
Aggregating: Combining data from multiple sources for centralized analysis.
Quarantining: Isolating a file, device, or user to prevent the spread of potential threats.
Archiving: Storing data for long-term retention, often for compliance or historical purposes.
Emerging Technologies
A. Serverless framework
B. Type 1 hypervisor
C. SD-WAN
D. SDN
Emerging Technologies
Serverless Framework: A cloud computing model where applications run without managing underlying infrastructure.
Type 1 Hypervisor: Virtualization software running directly on hardware to host virtual machines.
SD-WAN (Software-Defined Wide Area Network): A network management approach that uses software to control WAN connections.
SDN (Software-Defined Networking): Network architecture that uses software for centralized control of network resources.
Security Controls
A. Corrective
B. Preventive
C. Detective
D. Deterrent
Corrective: Actions taken to restore systems or mitigate damage after an incident.
Preventive: Measures implemented to stop security threats before they occur.
Detective: Tools or methods that identify and alert on suspicious activities.
Deterrent: Mechanisms designed to discourage malicious activity through visible warnings or obstacles.
IT Processes
A. Guard rail script
B. Ticketing workflow
C. Escalation script
D. User provisioning script
Guard Rail Script: Automated scripts to enforce predefined limits or configurations.
Ticketing Workflow: Systems for tracking and managing support or change requests.
Escalation Script: Procedures for escalating issues to higher authority or expertise levels.
User Provisioning Script: Automated scripts for creating or managing user accounts and access rights.
Risk and Network Management
A. Compensating control
B. Network segmentation
C. Transfer of risk
D. SNMP traps
Compensating Control: Security measures implemented to satisfy compliance when primary controls are not feasible.
Network Segmentation: Dividing a network into smaller segments to improve security and control traffic.
Transfer of Risk: Shifting risk to another entity, often through insurance or outsourcing.
SNMP Traps: Alerts sent by network devices to notify administrators of specific events or issues.
Secure Development Practices
A. Identify embedded keys
B. Code debugging
C. Input validation
D. Static code analysis
Identify Embedded Keys: Detecting hard-coded keys within software for security analysis.
Code Debugging: Identifying and fixing errors or vulnerabilities in code.
Input Validation: Ensuring user inputs meet specific criteria to prevent attacks like SQL injection.
Static Code Analysis: Reviewing source code for vulnerabilities without executing the program.
High Availability and Resilience
A. Clustering servers
B. Geographic dispersion
C. Load balancers
D. Off-site backups
Clustering Servers: Grouping servers to improve availability and balance workloads.
Geographic Dispersion: Distributing systems or resources across multiple locations to reduce risk.
Load Balancers: Distributing network or application traffic across multiple servers.
Off-Site Backups: Storing backups in a separate physical location to ensure recovery after disasters.
Security Threats
A. End of life
B. Buffer overflow
C. VM escape
D. Jailbreaking
End of Life (EOL): When a product is no longer supported, making it vulnerable to new threats.
Buffer Overflow: Exploiting a software flaw by overloading memory to execute malicious code.
VM Escape: A vulnerability where an attacker accesses the host system from a virtual machine.
Jailbreaking: Removing manufacturer-imposed restrictions on devices, potentially exposing them to risks.
Metrics and Performance
A. MTTR
B. RTO
C. ARO
D. MTBF
MTTR (Mean Time to Recovery): The average time required to restore functionality after a failure.
RTO (Recovery Time Objective): The targeted duration to recover systems after an outage.
ARO (Annualized Rate of Occurrence): The expected frequency of a risk occurring within a year.
MTBF (Mean Time Between Failures): The average time between system failures.
Network Administration
A. Console access
B. Routing protocols
C. VLANs
D. Web-based administration
Console Access: Direct connection to a device for management and configuration.
Routing Protocols: Standards for exchanging routing information between devices.
VLANs (Virtual Local Area Networks): Segments within a network to isolate traffic and enhance security.
Web-Based Administration: Managing systems or devices through a web interface.
Incident Response Phases
A. Preparation
B. Recovery
C. Lessons learned
D. Analysis
Preparation: Developing and implementing plans to handle incidents effectively.
Recovery: Restoring systems and operations after an incident.
Lessons Learned: Reviewing the incident to identify improvements for future responses.
Analysis: Investigating the cause and impact of an incident to prevent recurrence.
Security Technologies
A. SPF
B. GPO
C. NAC
D. FIM
SPF (Sender Policy Framework): Email authentication to prevent spoofing.
GPO (Group Policy Object): A Windows feature for managing security and configurations across systems.
NAC (Network Access Control): Controlling access to a network based on compliance and policies.
FIM (File Integrity Monitoring): Detecting changes to files for security and compliance.