Section 2.5 Flashcards

1
Q

what are some ways to segment the network?

A

Network segmentation can happen through physical segmentation, VLANs, or virtual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some reasons for segmenting the network?

A
  • Increased performance
  • Increased security
  • Due to compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an ACL?

A

ACL stands for Access Control Lists. This provides a way to allow or disallow traffic through the network or OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is EFS?

A

EFS is the Encrypted File System capability that’s part of the Windows system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is FDE?

A

FDE stands for Full Disc Encryption. An example of it is Bitlocker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a SIEM?

A

SIEM stands for Security Information and Event Manager. It’s a security solution that provides real time analysis, monitoring and management of security related data from various sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a posture assessment?

A

A posture assessment checks the system to make sure the latest security patches have been updated (such as OS Patch, EDR (Endpoint Detection and Response) version, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an EDR?

A

EDR stands for Endpoint Detection and Response.
EDR can detect a threat through signatures, behavioral analysis (watching what the user or application does), machine learning, process monitoring and more.

In addition it investigates threats to perform a root cause analysis of the threat.

Lastly, if the EDR recognizes malicious code, EDR will isolate the system, quarantine the threat and rollback to a previous configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Host-based Firewall?

A

A host based firewall is a software based firewall that is installed in each individual system. This way each system can configure what traffic to allow and disallow.
Although, the host based firewall is installed in each system, it can be managed from a central point as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is HIPS?

A

HIPS stands for Host-based Intrusion Prevention System and it’s used to recognize and block known attacks, secure OS and application configs, validate incoming traffic, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly