Security Flashcards

1
Q

Disk Encryption

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

partition encryption

A

data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

update software apps regulary

A

app > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

APIS

A

app > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disable root login

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

implement intrusion detection

A

file > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

setup dedicated users for services

A

app > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

remove unnecessary packages

A

app > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

implement ssh key pairs

A

authentication and authroization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

reduce number of servcies provided by a single host

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data at rest

A

data > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

virtual switches

A

network> cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

compute resources

A

compute > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

serverless

A

app > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

inventory managmeent

A

compute >cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

implement a local firewall

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

implement an intrusion prevention system

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

standard apps, microservices and containers

A

app > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

network perimeter

A

network > cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

apply kernely security patches

A

kernel > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

set a grub bootloader password

A

kernel > system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

file encryption

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

offsite backups

A

data

24
Q

disable booting from external drives

A

kernel > system

25
Q

implement a VPN

A

network

26
Q

interact with services

A

systemct network

27
Q

view sockets processes and open files

A

ss, ps, lsof

28
Q

data in transit/motion

A

data > cloud

29
Q

cryotography and key management

A

data > cloud

30
Q

virtual firewalls

A

network > cloud

31
Q

hypervisors

A

compute > cloud

32
Q

middleware and runtime

A

compute > cloud

33
Q

disable unecessary services

A

app > system

34
Q

setup dedicated users for services

A

app > security

35
Q

implement security best practices for common system services

A

app > system

36
Q

use separate partitions for suers files and system files

A

file > system

37
Q

implement selinux for apparmor

A

file > system

38
Q

manage bash history

A

file > system

39
Q

update /etc/syscrl.conf with secure configurations

A

kernel > system

40
Q

enforce strong passwords and password expiration

A

authorization and authentication

41
Q

operating systems and virtual machines

A

compute >cloud

42
Q

involves the protection of hypervisors vms and os

A

compute based security

43
Q

concerned with protections around storing and transferring data whcih generally includes cryptography

A

data > cloud

44
Q

network security groups

A

netowrk > cloud

45
Q

remote backups

A

data>cloud

46
Q

Interact with firewall

A

firewall-cmd red hat and ufw debian

47
Q

transport layer seucirty TLS when possible or secure socket layer

A

network

48
Q

implement a centralized authentications ervice kerberos

A

network

49
Q

use encryption for data transfer

A

network

50
Q

open only necessary ports in the firewall

A

network

51
Q

utilize relevant mount options for security file

A

system

52
Q

userspace program that provides disk encrpytion

A

cryptsetup

53
Q

used for encrypting partitions and files

A

dm crypt

54
Q

tools for data transfer and communication

A

scp, ssh, rsync sftp network

55
Q

investigate and analysis tools

A

wireshark, nmap, traceroute network