Security Operations Domain Flashcards

1
Q

Identifies any unacceptable deviation from expected behavior based on actual traffic structure

A

Traffic anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science of hiding information

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches

A

Statistical Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Credential cards with one or more microchip processing that accepts or processes information and can be contact or contact less

A

Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounts used to provide privileged access used by system services and core applications

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of software virtualization that lets programs and processes run in their own isolated virtual environment

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock

A

Rim Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The measure of the existing magnetic field on the media after degaussing

A

Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Essential activities to protect business information and can be established in compliance with laws, regulations or corporate governance

A

Records and Information Management (RIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use embedded antenna wires connected to a chip within the card through RF

A

Proximity Card (Prox Card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifies any unacceptable deviation from expected behavior based on known network protocols

A

Protocol Anomaly-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required

A

Power Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card

A

Magnetic Stripe (mag stripe) cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data that are dynamic and exist in running processes or other volatile locations (e.g, system/device RAM) that disappear in a relatively short time once the system is powered down

A

Live evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two or more honeypots on a network

A

Honeynet

17
Q

A centralized collection of honeypots and analysis tools

A

Honeyfarm

18
Q

Decoy servers or systems setup to gather information regarding an attacker or intruder into your system

A

Honeypot

19
Q

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity

A

Intrusion Prevention System (IPS)

20
Q

A technology that alerts organizations to adverse or unwanted activity

A

Intrusion Detection System (IDS)

21
Q

A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area

A

Infrared Linear Beam Sensors

22
Q

The practice of monitoring and potentially restricting the flow of information outbound from one network to another

A

Egress filtering

23
Q

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise

A

Data Leak Prevention (DLP)

24
Q

A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems

A

Configuration Management (CM)

25
Q

A lock controlled by touch screen typically 5 to 10 digits that when pushed in the right combination the lock will relase and allow entry

A

Cipher Lock

26
Q

The who, what, when, where and how the evidence was handled - from its indentification through its entire life cycle, which ends with destruction, permanent archiving or returning to owner

A

Chain of Custody

27
Q

Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated

A

Balanced Magnetic Switch (BMS)

28
Q

Accounts that are assigned only to named infividuals that require administrative access to the system to perform maintenance activities and should be different and separate from a user’s normal account

A

Administrator Accounts

29
Q

Device that uses passive listening devices

A

Acoustic Sensors

30
Q

States that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange

A

Locard’s exchange principle

31
Q

A lock or latch that is recessed into the edge of a door, rather that being mounted to its surface

A

Mortise Lock

32
Q

The party to party litigation costs resulting from its breach of warranties

A

Indemnification

33
Q

Provide a quick way to disable a key by permitting one turn of the master key to change a lock

A

Instant Keys

34
Q

Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric

A

Time Domain Reflectometry (TDR)