Security Operations Flashcards

1
Q

Identifies any unacceptable deviation from expected behavior based on actual traffic structure.

A

Traffic Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Science of hiding information

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches.

A

Statistical Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Credential cards with one or more microchip processing that accepts or processes information & can be contact or contactless.

A

Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounts used to provide privileged access used by system services & core applications.

A

Service Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Group of technologies which aggregate information about access controls & selected system activity to store for analysis & correlation.

A

Security Information & Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of software virtualization that lets programs & processes run in their own isolated virtual environment.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock.

A

Rim Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Measure of the existing magnetic field on the media after degaussing

A

Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discipline for evaluating, coordinating, approving or disapproving, & implementing changes in artifacts that are used to construct & maintain software systems.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lock controlled by touch screen, typically 5-10 digits that when pushed in the right combination the lock will release & allows entry.

A

Cipher Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The who, what, when, where, and how the evidence was handled - from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning to owner.

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated.

A

Balanced Magnetic Switch (BMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accounts that are assigned only to named individuals that require Admin access to the system to perform maintenance activities, & should be different & separate from a user’s normal account.

A

Admin Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Device that uses passive listening devices

A

Acoustic Sensors

17
Q

Technology that alerts organizations to adverse or unwanted activity.

A

Intrusion Detection Systems (IDS)

18
Q

Provide a quick way to disable a key by permitting one turn of the master key to change a lock

A

Instant Keys

19
Q

A focused Infrared (IR) light beam is projected from an emitter & bounced off of a reflector that is placed at the other side of the detection area.

A

Infrared Linear Beam Sensors

20
Q

Practice of monitoring & potentially restricting the flow of information outbound from one network to another.

A

Egress Filtering

21
Q

States that when a crime is committed, the perpetrators leave something behind & take something with them, hence the exchange.

A

Locard’s Exchange Principle

22
Q

Data that are dynamic & exist in running processes or other volatile locations (RAM) that disappear in a relatively short time once the system is powered down.

A

Live Evidence

23
Q

Two or more honeypots on a network

A

Honeynet

24
Q

A centralized collection of honeypots & analysis tools

A

Honeyfarm

25
Q

Decoy servers or systems setup to gather information regarding an attacker or intruder into your system.

A

Honeypot

26
Q

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.

A

Intrusion Prevention Systems (IPS)

27
Q

The party-to-party litigation costs resulting from its breach of warranties.

A

Indemnification

28
Q

Essential activities to protect business information & can be established in compliance with laws, regulations, or corporate governance.

A

Records & Information Management (RIM)

29
Q

Use embedded antenna wires connected to a chip within the card through RF.

A

Proximity Cards

30
Q

Identifies any unacceptable deviation from expected behavior based on known network protocols.

A

Protocol Anomaly-Based IDS

31
Q

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where Admin access is not required.

A

Power Users

32
Q

A lock or latch that is recessed into the edge of a door, rather than being mounted to its surface.

A

Mortise Lock

33
Q

Consists of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card.

A

Magnetic Stripe Cards

34
Q

Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric.

A

Time Domain Reflectometry (TDR)