Professor Messer test Flashcards

1
Q

MTBF

A
The MTBF (Mean Time Between Failures) is a prediction of how often a
repairable system will fail.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MTTF

A

MTTF (Mean Time to Failure) is the expected lifetime of a non-repairable
product or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RTO

A

RTO (Recovery Time Objectives) define a set of objectives needed to
restore a particular service level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A

Vishing (voice phishing) attacks use the phone to obtain private information from others. In this example, the attacker was not asking for confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP-TTLS

A

EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer
Security) allows the use of multiple authentication protocols transported
inside of an encrypted TLS (Transport Layer Security) tunnel. This allows
the use of any authentication while maintaining confidentiality with TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CASB uses

A
A CASB (Cloud Access Security Broker) can be used to apply security policies to cloud-based implementations. Two common functions of a CASB are visibility into application use and data security policy use. Other
common CASB functions are the verification of compliance with formal standards and the monitoring and identification of threats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False negative

A

A false negative is a result that fails to detect an issue when one actually exists. (think of the scenario where a patch exists but the vulnerability scanner fails to pick it up)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

non persistent environment

A

A non-persistent environment is always in motion, and application instances can be created, changed, or removed at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nbtstat

A

The nbtstat (NetBIOS over TCP/IP statistics) command is used in Windows to send NetBIOS queries to other Windows devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual Mobile Infrastructure (VMI)

A

Virtual Mobile Infrastructure (VMI) is a mobile-centric technology that runs mobile apps on a mobile operating system (OS)/virtual machine that is located on a remote server. This essentially creates a virtual device running in the data center that can be accessed by a thin client app on mobile endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtual Mobile Infrastructure (VMI)

A

Virtual Mobile Infrastructure (VMI) is a mobile-centric technology that runs mobile apps on a mobile operating system (OS)/virtual machine that is located on a remote server. This essentially creates a virtual device running in the data center that can be accessed by a thin client app on mobile endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

threshold analysis

A

A threshold analysis is the process of identifying business processes that
are privacy-sensitive, and it’s usually associated with privacy compliance
and not with the identification of security weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ITIL

A

ITIL is a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a stable IT environment that allows for growth, scale and change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBIT

A

example, COBIT (Control Objectives for Information and Related Technologies) is a framework that many organizations use to ensure that business goals and IT security goals are linked together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOX

A

The Sarbanes-Oxley Act (SOX) was passed in 2002 to ensure that shareholders and citizens were protected from accounting errors or fraudulent practices occurring in enterprises. It also helps to ensure the accuracy of public disclosures made by these enterprises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GLBA

A

This is also known as the Financial Services Modernization Act and includes a Financial Privacy Rule. This rule requires financial institutions to provide consumers with a privacy notice explaining what information they collect and how that information is used.

17
Q

Certificate pinning

A

Certificate pinning embeds or “pins” a certificate inside of an application.When the application contacts a service, the service certificate will be compared to the pinned certificate. If the certificates match, the
application knows that it can trust the service.

18
Q

ISA

A

An interconnection security agreement (ISA) is commonly used by the
United States federal government to define security controls between
organizations.

19
Q

PEM

A

The PEM (Privacy-Enhanced Mail) certificate format is a BASE64 encoded
DER certificate. This represents the certificate in an ASCII format with
letters and numbers, which makes it very easy format to email.

20
Q

PKCS #7

A

The PKCS #7 (Public Key Cryptography Standards #7) format is commonly
associated with the P7B file extension. This stores the certificate in a
human-readable ASCII format, and usually contains certificates and chain
certificates. Private keys are not included in a P7B file.

21
Q

CER

A
The CER (Certificate) format is a Windows X.509 file extension that
usually contains a public key. It is a common format for Windows
certificates, and often has a CER file extension.
22
Q

P7B

A

The PKCS #7 (Public Key Cryptography Standards #7) format is commonly associated with the P7B file extension. This stores the certificate in a human-readable ASCII format, and usually contains certificates and chain certificates. Private keys are not included in a P7B file.

23
Q

Continuity planning

A

Continuity planning focuses on keeping the business running when a disruption occurs. Disaster recovery planning is a type of continuity plan.

24
Q

Change management

A

Change management is the process for making any type of change. This could be a software upgrade, a hardware replacement, or any other type of modification to the existing environment. Having a formal change management process minimizes the risk of a change and makes everyone aware of the changes as they occur.

25
Q

NULL pointer dereference

A

If an application is written to reference a portion of memory, but nothing is currently allocated to that area of memory, a NULL pointer dereference
will occur. This can cause the application to crash, display debug information, or create a denial of service (DoS).

26
Q

Anomaly-based detection

A

Anomaly-based detection will build a baseline of what it considers to be
normal. Once the baseline is established, the IPS (Intrusion Prevention
System) will then block any traffic that deviates from the baseline.

27
Q

Heuristic IPS

A

Heuristic IPS technology uses artificial intelligence to identify attacks that have no prior signature.

28
Q

Behavior-based IPS

A

Behavior-based IPS technology will alert if a particular type of bad behavior
occurs.

29
Q

Signature-based IPS

A

A signature-based IPS is looking for a specific traffic flow pattern, and once that traffic matches the signature the traffic can be blocked.

30
Q

Alternate business practice

A

Modifying the normal business process for another working option is an alternate business practice. This alternate can be less efficient, but it can provide a useful option while the original business practice is unavailable.

31
Q

Failover

A

A failover process allows for the normal recovery of a business process without any significant change to normal operations

32
Q

Differential recovery

A

A differential backup creates a copy of every file that has changed since
the last full backup. A differential recovery uses a full backup and each
differential backup to complete the recovery process.