Security Operations Flashcards

1
Q

Identifies any unacceptable deviation from expected behavior based on actual traffic structure.

A

Traffic Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Science of hiding information

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches.

A

Statistical Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Credential cards with one or more microchip processing that accepts or processes information & can be contact or contactless.

A

Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounts used to provide privileged access used by system services & core applications.

A

Service Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Group of technologies which aggregate information about access controls & selected system activity to store for analysis & correlation.

A

Security Information & Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of software virtualization that lets programs & processes run in their own isolated virtual environment.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock.

A

Rim Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Measure of the existing magnetic field on the media after degaussing

A

Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Discipline for evaluating, coordinating, approving or disapproving, & implementing changes in artifacts that are used to construct & maintain software systems.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lock controlled by touch screen, typically 5-10 digits that when pushed in the right combination the lock will release & allows entry.

A

Cipher Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The who, what, when, where, and how the evidence was handled - from its identification through its entire life cycle, which ends with destruction, permanent archiving, or returning to owner.

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated.

A

Balanced Magnetic Switch (BMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accounts that are assigned only to named individuals that require Admin access to the system to perform maintenance activities, & should be different & separate from a user’s normal account.

A

Admin Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Device that uses passive listening devices

A

Acoustic Sensors

17
Q

Technology that alerts organizations to adverse or unwanted activity.

A

Intrusion Detection Systems (IDS)

18
Q

Provide a quick way to disable a key by permitting one turn of the master key to change a lock

A

Instant Keys

19
Q

A focused Infrared (IR) light beam is projected from an emitter & bounced off of a reflector that is placed at the other side of the detection area.

A

Infrared Linear Beam Sensors

20
Q

Practice of monitoring & potentially restricting the flow of information outbound from one network to another.

A

Egress Filtering

21
Q

States that when a crime is committed, the perpetrators leave something behind & take something with them, hence the exchange.

A

Locard’s Exchange Principle

22
Q

Data that are dynamic & exist in running processes or other volatile locations (RAM) that disappear in a relatively short time once the system is powered down.

A

Live Evidence

23
Q

Two or more honeypots on a network

24
Q

A centralized collection of honeypots & analysis tools

25
Decoy servers or systems setup to gather information regarding an attacker or intruder into your system.
Honeypot
26
A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.
Intrusion Prevention Systems (IPS)
27
The party-to-party litigation costs resulting from its breach of warranties.
Indemnification
28
Essential activities to protect business information & can be established in compliance with laws, regulations, or corporate governance.
Records & Information Management (RIM)
29
Use embedded antenna wires connected to a chip within the card through RF.
Proximity Cards
30
Identifies any unacceptable deviation from expected behavior based on known network protocols.
Protocol Anomaly-Based IDS
31
Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where Admin access is not required.
Power Users
32
A lock or latch that is recessed into the edge of a door, rather than being mounted to its surface.
Mortise Lock
33
Consists of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card.
Magnetic Stripe Cards
34
Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric.
Time Domain Reflectometry (TDR)