Review Topics 2 Flashcards

1
Q

a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should detect the issue and stop it from spreading throughout the network

A

Heuristic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

provides the validation of the user’s identity

A

Identify Provider (IdP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an XML-based framework for exchanging security-related information such as user authentication, entitlement, and attributes

A

Security assertions markup language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated

A

cross-site request forgery (CSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the process of harvesting an account’s cached credentials when the user logs in to a single sign-on (SSO) system

A

Pass the Hash (PtH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information about a subject’s opinions, beliefs, and nature afforded specially protected status by privacy legislation

A

Sensitive Personal Information (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

identifies the maximum amount of time it can take to restore a system after an outage

A

recovery time objective (RTO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the amount of data loss that a system can sustain, measured in time

A

recovery point objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

can create perfect copies or forensic images of computer data without making changes to the original evidence

A

FTK Imager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

will allow an attacker to execute arbitrary JavaScript within the victim’s browser (such as creating pop-ups)

A

cross-site scripting (XSS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a hardened server that provides access to other hosts

A

jumpbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should detect the issue and stop it from spreading throughout the network

A

Heuristic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly