Securing Hosts And Data Flashcards

1
Q

Principle that states systems should be deployed with only the application, services, and protocols they need to meet their purpose

A

Least Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of OS that disappears when users turn off the computer

A

Non-persistent operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of OS that meets predetermined requirements with a heavy emphasis on authentication and authorization

A

Trusted Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The two important benefits that imaging provides

A
  • Secure Starting Point

- Reduced Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These two strategies include automation, scripting, and templates to help deploy systems securely, and keep them in a secure state

A

Resiliency and automation strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The three steps in baseline configuration

A
  • Initial baseline configuration
  • Integrity measurements for baseline deviation
  • Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This ensures that systems and applications stay up to date with current updates

A

Patch Management. Usually combined with NAC technologies to identified unpatched devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process used to control changes and modifications done on systems and applications.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process used to protect hosts to include mobile devices, workstations, and servers from unauthorized applications

A

Whitelisting & Blacklisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This technique refers to using an isolated area on a system to test software.

A

Sandboxing

Linux - chroot command or chroot jail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The secure staging environments used to create software

A

Development
Test
Staging
Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are associated with embedded systems and often have internal storage that might retain documents that they process.

A

Multi-Function Devices (MFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The difference between EMI and EMP

A

EMI - Electronic Magnetic Interference. Associated with powerlines, microwaves, motors

EMP - Electronic Magnetic Pulse. Associated with Military tech, ESD, and lightning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The difference between FDE and SED

A

Full Disk Encryption - Encrypts entire disk

Self Encrypting Device - Includes hardware and software to provide encryption to a drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The difference between BIOS and UEFI

A

BIOS - referred as firmware.

UEFI - Does the same as BIOS but it can boot from larger disk and its CPU-independent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a hardware chip on the computer’s motherboard that stores cryptographic keys used for encryption.

A

TPM - Trusted Platform Module. Supports Secure Boot & Attestation. Provides a hardware root of trust or known secure starting point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is similar to a TPM but it is added to a system to manage and securely store cryptographic keys

A

HSM - Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The three most common type of cloud based technologies used

A

SAAS - Software as a Service. Web services
PAAS - Platform as a Service - Software is managed by the CSP.
IAAS - Infrastructure as a Service - Software is managed by the customer.

19
Q

Which Cloud model leaves the majority of the security responsibility to the customer

A

IAAS

20
Q

Which Cloud model leaves the least amount of security responsibility to the customer

A

SAAS

21
Q

This cloud service provides security services and considered a subset of the software as a Service model

A

Security as a Service

22
Q

This is a software tool or service deployed between an organization’s network and the cloud provider to monitory traffic and enforce security policies.

A

CASP - Cloud Access Security Broker

23
Q

The four categories of cloud deployment models

A

Public
Private
Community
Hybrid

24
Q

The 5 common deployment models for mobile devices

A
Corporate owned
COPE - Corporate owned, personally enabled
BYOD - Bring Your Own Device
CYOD - Choose Your Own Device
VDI - Virtual Desktop Interface
25
Q

This includes the technologies to manage mobile devices

A

MDM - Mobile Device Management

26
Q

This is an MDM application that isolates storage data.

A

Storage Segmentation

27
Q

This is an MDM application that ensures that the appropriate content is stored in the correct location or segmented storage

A

Content Management

28
Q

An MDM concept that describes the use of cell virtualization to isolate and protect an application.

A

Containerization

29
Q

Organization sometimes use GPS to create a virtual or geographical boundary

A

Geofencing

30
Q

An MDM concept that uses multiple elements to authenticate a user and mobile device

A

Context-aware

31
Q

This is the process of modifying an Android device to give the user full admin access

A

Rooting

32
Q

The process of copying an application package in the application packet kit (APK) format to the device and then activating it

A

Sideloading

33
Q

These cables allows you to connect just about any device to your mobile device

A

USB-OTG (On the Go)

34
Q

Allows the internet connection of a device to be shared with other devices.

A

Tethering

35
Q

Allows a device to connect without a wireless AP or wireless router

A

WI-FI Direct - Similar to an ad hoc network

36
Q

What is the difference between WI-FI Direct and Ad-hoc

A

Wi-fi Direct - uses single radio hop as opposed multi-hop wireless communications

37
Q

The name of a device that has a dedicated function and uses a computer system to perform that function

A

Imbedded System - Such as wearable tech, Home Automation, UAV, vehicles, and medical devices

38
Q

This is a type of operating system that react to input within a specific time

A

RTOS - Real Time Operating System

39
Q

What are the file system encryption technologies for Windows and Linux

A

Windows - EFS - Encrypting File System

Linux - GNU Privacy Guard

40
Q

Linux: Read / Write / Execute are represented by what numbers

A

Read - 4
Write - 2
Execute - 1

41
Q

What command is used in Linux to change permissions on files

A

chmod - changemode

42
Q

What techniques do organizations use to stop information from being taken from their infrastructure

A

DLP - Data Loss Prevention

43
Q

What is the term used to describe the unauthorized transfer of data outside an organization

A

Data Exfiltration