Security Operations Domain Flashcards

1
Q

Acoustic Sensors

A

Device that uses passive listening devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrator accounts

A

Accounts that are assigned only to named individuals that require administrative access to the system to perform maintenance activities; and should be different and separate from a user’s normal account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Balanced Magnetic Switch (BMS)

A

Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of custody

A

The who; what; when; where; and how the evidence was handled—from its identification through its entire life cycle; which ends with destruction; permanent archiving; or returning ot owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cipher Lock

A

A lock controlled by touch screen; typically 5 to 10 digits that when pushed in the right combination the lock will releases and allows entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration management (CM)

A

A discipline for evaluating; coordinating; approving or disapproving; and implementing changes in artifacts that are used to construct and maintain software systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Leak Prevention (DLP)

A

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Egress filtering

A

The practice of monitoring and potentially restricting the flow of information outbound from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infrared Linear Beam Sensors

A

A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Instant Keys

A

Provide a quick way to disable a key by permitting one turn of the master key to change a lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion Detection System (IDS)

A

A technology that alerts organizations to adverse or unwanted activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Indemnification

A

The party to party litigation costs resulting from its breach of warranties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion Prevention System (IPS)

A

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Decoy servers or systems setup to gather information regarding an attacker or intruder into your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeyfarm

A

A centralized collection of honeypots and analysis tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeynet

A

Two or more honeypots on a network

17
Q

Live evidence

A

Data that are dynamic and exist in running processes or other volatile locations (e.g.; system/device RAM) that disappear in a relatively short time once the system is powered down

18
Q

Locard’s exchange principle

A

States that when a crime is committed; the perpetrators leave something behind and take something with them; hence the exchange

19
Q

Magnetic Stripe (mag stripe) cards

A

Consist of a magnetically sensitive strip fused onto the surface of a PVC material; like a credit card

20
Q

Mortise Lock

A

A lock or latch that is recessed into the edge of a door; rather than being mounted to its surface.

21
Q

Power users

A

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system; but where administrative access is not required

22
Q

Protocol Anomaly-Based IDS

A

Identifies any unacceptable deviation from expected behavior based on known network protocols

23
Q

Proximity Card (prox cards)

A

Use embedded antenna wires connected to a chip within the card through RF.

24
Q

Records and Information Management (RIM)

A

Essential activities to protect business information and can be established in compliance with laws; regulations; or corporate governance

25
Q

Remanence

A

The measure of the existing magnetic field on the media after degaussing

26
Q

Rim Lock

A

A lock or latch typically mounted on the surface of a door; typically associated with a dead bolt type of lock

27
Q

Sandboxing

A

A form of software virtualization that lets programs and processes run in their own isolated virtual environment

28
Q

Security Informatn and Event Management (SIEM)

A

A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation

29
Q

Service accounts

A

Accounts used to provide privileged access used by system services and core applications

30
Q

Smart Cards

A

Credential cards with one or more microchip processing that accepts or processes infomraiton and can be contact or contact less.

31
Q

Statistical Anomaly-based IDS

A

Analyzes event data by comparing it to typical; known; or predicted traffic profiles in an effort to find potential security breaches

32
Q

Steganography

A

The science of hiding information

33
Q

Traffic anomaly-based IDS

A

Identifies any unacceptable deviation from expected behavior based on actual traffic structure

34
Q

Time domain Reflectometry (TDR)

A

Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric