Section 2.1 Security Concepts in an Enterprise Environment Flashcards

1
Q

What ensures that systems are configured similarly, configurations are known and documented?

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What helps reduce outages or weakened security from unauthorized changes?

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What uses a labeling or numbering system to track changes in updated versions of software?

A

Versioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What ensures that systems are deployed with a common baseline or starting point, and imaging is a common method?

A

Baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What make identifying device type (router, server, printer) easier?

A

Standard Naming Convention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call maintaining an up to date asset register to ease the process of tracking and maintaining assets?

A

Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call using network segmentation to reduce broadcast traffic and enable filtering/restricting traffic to subnets containing sensitive resources?

A

IP Schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when digital data is subject to the laws and regulations of the country in which it was created? It cannot be moved to another region, even for a backup-related reason.

A

Data Sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality is often protected through?

A

Encryption (at rest and in transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called where meaningful data is replaced with a token that is generated randomly, and the original data is held in a vault? Stateless, stronger than encryption, keys not local.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call the de-identification procedure in which PII fields within a data record are replaced by one or more artificial identifiers, or pseudonyms? Reversal requires access to another data source

A

Pseudo-Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is it called when only partial data is left in a data field? Commonly implemented within the database tier, but also possible in code of front-end applications.

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a way to protect sensitive information and prevent its inadvertent disclosure? Can identify, monitor, and automatically protect sensitive information in documents?

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSP storage providers usually protect data at rest by?

A

automatically encrypting before persisting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What helps you encrypt Windows and Linux IaaS VM’s disks using BitLocker (Windows) and dm-crypt feature of Linux to encrypt OS and data disks?

A

Full Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What helps protect SQL Database and data warehouses against threat of malicious activity with real-time encryption and decryption of database, backups, and transaction log files at rest without requiring app changes?

A

Transparent Data Encryption (TDE)

17
Q

What is on the motherboard and is used to store the encryption keys so when the system boots, it can compare keys and ensure that the system has not been tampered with?

A

TPM

18
Q

When using certificates for Full Disk Encryption, the use _____________ that verifies that the keys match before the secure boot process takes place?

A

Hardware root of trust

19
Q

What is the industry standard for self-encrypting drives? This is a hardware solution and typically outperforms software based alternatives.

A

OPAL Storage specification

20
Q

What are purchased already set to encrypt data at rest and keeps the encryption keys stored on the hard drive controller? They are immune to a cold boot attack and are compatible with all OS’s.

A

Solid State Drives (SSD)

21
Q

Data in motion is most often encrypted using?

A

TLS or HTTPS

22
Q

What allows content owners to enforce restrictions on the use of their content by others? Commonly protect entertainment and media content, such as music, movies, and e-books.

A

DRM

23
Q

What kind of programs enforce data rights, provisioning access, and implementing access control models? Can be used to block specific actions, like print, copy/paste, download and sharing.

A

Information Rights Management (IRM)

24
Q

What type of incident response plan has you distribute copies of the plans to the members of the incident response team for review? Team members then provide feedback about any updates needed to keep the plan current.

A

Read-through test

25
Q

What type of incident response plan has members of the disaster recovery team gather in a large conference room and role-play a disaster scenario? The team members refer to the document and discuss the appropriate responses to that particular type of disaster.

A

Structured Walkthrough/Tabletop Exercise

26
Q

What type of incident response plan is similar to structured walkthroughs, except some of the response measures are then tested (on non-critical functions)?

A

Simulation Test

27
Q

How do you secure email traffic?

A

Standards for encrypted messages include S/MIME protocol and Pretty Good Privacy (PGP)

28
Q

How do you secure web traffic?

A

The de facto standard for secure web traffic is the use of HTTP over TLS

29
Q

How do you secure network traffic?

A

IPsec protocol standard provides a common framework for encrypting network traffic and is built into many common OS’s.

30
Q

What is a set of exposed interfaces that allow programmatic interaction between services?

A

API’s

31
Q

What uses the HTTPS protocol for web communications to offer API end points?

A

REST

32
Q

What is it called when the security teams/tools send false information back to an attacker spotted using offensive security tools, like port scanners?

A

Fake Telemetry

33
Q

What protects users by intercepting DNS requests attempting to connect to known malicious domains and returning a false address?

A

DNS Sinkhole