Random (too lazy to put in categories) Flashcards

1
Q

What is MFD?

A

Multifunction Device

(like all-in-one printers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISO 27001

A

ISO 27001 standard is the foundational standard for Information Security Management Systems (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IOS 27701

A

ISO 27701 stand extends the ISO 27001 and 27002 standards to include detailed management of PII and data privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISO 31000

A

ISO 31000 satnds sets internation standards for risk management practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27002

A

ISO 27002 focus on information security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user connects to a third-party website and receives this message:

Your connection is not private.
NET::ERR_CERT_INVALID

What attack would be the MOST likely reason for this message?

A

On-path

The entity in the middle would not be able to provide a valid SSL certificate for a third-party website, and this error would appear in the browser as a warning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTTF

A

Mean Time to Failure

expected lifetime of a non-repairable product or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP-TTLS

A

Extensible Authentication Protocol - Tunneled Transport Layer Security

allows the use of multiple authentication protocols transported inside of an encrypted TLS tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventative

A

physcially limits access to a device or area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corrective

A

can actively work to mitigate any damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Detective

A

may not prevent access, but it can identify and record and intrusion attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compensating

A

doesn’t prevent an attack, but it does restore from an attack using other means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Control

A

real-world security, such as a fence or door lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deterrent

A

does not directly stop an attack, but it may discourage an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

USB Data Blocker

A

physical USB cables that allow power connections but prevent data connections

17
Q

SED

A

Self-Encrypting Drive

provides data protection of a storage device using fully-disk encryption in the drive hardware

18
Q

TLS VPN

A

frequently chosen when ease of use is important, and web applications are the primary usage mode

19
Q

IPSec VPN

A

are used for site-to-site VPNs and for purposes where other protocols may be needed because they make the enpoint system appear to be on the remote network

20
Q

DMZ

Demilitarized zone

A

a separate subnet coming off the separate router interface

public traffic may be allowed to pass from the external public interface to the DMZ, but won’t be allowed to pass to the interface that connectes to the internal private network

21
Q

VLAN

A

think of PARTITIONING!!

emulates physical partitioning
most often used to segment the internal network

22
Q

IPv6

A

includes IPsec built into the protocol by default

also provides an extended IP address range for networks, eliminating the need for using NAT

23
Q

Wireshark

A

free and open-source packet analyzer

used for network troubleshooting, analysis, software and communications protocol development, and education

24
Q

Containerization

A

the logical isolation of enterprise data from personal data while co-existing in the same device

major benefit of containerization is that adminstrators can only work profiles that are kept separate from the user’s personals accounts, apps, and data

creates a secure vault for your coporate information

25
Q

What should you place at the end of your ACL rules?

A

An implicit deny statement

26
Q

What easily detects buffer overflows?

A

Static code analysis

27
Q

SPI

Sensitive Personal Information

A

information about a subject’s opinions, beliefs, and nature afforded specially protected status by privacy legislation

28
Q

Load balancer

A

allows for high availability and the ability to serve increased demand by splitting the workload across multiple servers

29
Q

DaaS

Desktop as a Service

A

provides a full virtualized desktop enviroment from within a cloud-based service

also known as VDI (Virtualizaed Desktop Infrastructure)

like Stadia or NVIDIA GeForce Now :D