Section 3.2 Host and Application Security Solutions Flashcards
Where should endpoint detection be focused?
Throughout the entire network
What monitors network activity for suspicious behavior and alerts if anything is found?
Intrusion Detection Systems (IDS)
What monitors network activity and attempts to deal with the issue and either disconnects suspicious connections or turn off attacked services?
Intrusion Prevention Systems (IPS)
What monitors network patterns and headers of network patches?
Network Intrusion Detection systems (NIDS)
What component of NIDS collect network data and sends it to the network monitor for analysis?
Detection Agent
What component of NIDS takes data from the detection agent, analyzes it, and sends warning notifications?
Network Monitor
What component of NIDS is used for notifications and alarms which are sent to the administrator?
Notification system
IDS’s are usually located where on the network?
A central point
What mode of IDS deployment analyzes all traffic?
In-band
What mode of IDS deployment only analyzes some of the traffic?
Out-of-band
What do you call a NIDS that uses active detection methods to take immediate steps to halt an intrusion?
NIPS
What prevention system reroutes network traffic in case of network attacks and terminates suspicious network activity?
NIPS
What is a disadvantage of active detection systems?
False positives can shut down the system
What kind of intrusion detection takes steps to mitigate an intrusion?
Active Intrusion Detection
What kind of intrusion detection typically logs the event or generates alarms?
Passive Intrusion Detection
What do you call a deep-packet inspection firewall that moves beyond port/protocol inspection and blocking?
Next Generation Firewall
What kind of monitoring systems contain signature databases that they use to detect attacks?
Signature-Based Monitoring
What kind of monitoring systems rely on the collective knowledge of security vendors but are unable to detect new attacks that haven’t been recorded?
Signature-Based Monitoring
What kind of monitoring systems use a known good baseline and looks for anomolies?
Behavior/Anomaly-Based Monitoring
What kind of monitoring systems are easily and quickly adapted to the environment and can detect new variants of attacks but take time to build a baseline profile?
Behavior/Anomaly-Based Monitoring
What kind of monitoring systems starts with an initial database of known attack types but changes its alert signatures based on learned behavior?
Heuristic-Based Monitoring
What do you call a type of attack that has rarely or never been encountered and takes advantage of previously unknown weaknesses and vulnerabilities in a software program or operating system?
A zero-day attack
What kind of monitoring systems relies on admin to create rules and determine consequences for breaking those rules?
Rule-based monitoring
What kind of monitoring systems require significant manual set-up and continuous updating?
Rule-based monitoring
What detection system monitors a specific host for suspicious behavior that could indicate someone is trying to break into the system?
Host-based Intrusion Detection System (HIDS)
What detection system can detect an attack by a malicious user who is physically accessing the system console?
Host-based Intrusion Detection System (HIDS)
What is an integrated endpoint security solution that combines: REAL-TIME continuous monitoring and collection of endpoint data with rules-based AUTOMATED RESPONSE AND ANALYSIS capabilities?
Endpoint Detection and Response (EDR)
What solutions keep sensitive data from leaving a network by a USB, email, etc.?
Data Loss Prevention Solutions
What solutions tag data with labels that say whether data can leave the network and how it can leave the network?
Data Loss Preventions
What protects both the computers and the networks to which they connect as well as provide a first level of defense to prevent virus spreading?
Antivirus
Most viruses and spyware enter a system how?
through email attachments and internet downloads
What kind of firewall performs critical functions to protect a user’s host computer?
Host-based firewall
What part of the host system contains the program code and instructions for starting a computer and loading the OS?
Basic Input/Output System
What do you call maintaining the BIOS of of a host system?
Boot Integrity
Modern systems use what to boot because it is more secure and is needed for a secure boot of the OS?
Unified Extensible Firmware Interface (UEFI)
What uses an unchangeable piece of hardware that contains cryptographic function keys, and verifies that BIOS is being loaded from a known good version?
Hardware Root of Trust
What do you call adding a suffix of random characters to a password before it is encrypted?
Salting
What creates a ‘unique fingerprint’ for a message?
Hashing
What prevents someone who gains unauthorized access to a database from being able to read the data without an encryption key?
Database Encryption
What makes sure that when applications are deployed, they don’t contain security issues that can expose sensitive data?
Secure coding practices
What do you call the surrounding infrastructure that supports software applications?
Data Center
What manages and provisions data centers through machine readable files instead of the physical hardware?
Infrastructure as Code
What do you call the small text files saved on your computer to store website data?
Cookies
What kind of cookies only transmit over secure channels?
Secure cookies