Security Operations Domain Flashcards

1
Q

Identifies any unacceptable deviation from expected behavior based on actual traffic structure

A

Traffic anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The science of hiding information

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Analyzes event data by comparing it to typical, known, or predicted traffic profiles in an effort to find potential security breaches

A

Statistical Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Credential cards with one or more microchip processing that accepts or processes information and can be contact or contact less

A

Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounts used to provide privileged access used by system services and core applications

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A group of technologies which aggregate information about access controls and selected system activity to store for analysis and correlation

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A form of software virtualization that lets programs and processes run in their own isolated virtual environment

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A lock or latch typically mounted on the surface of a door, typically associated with a dead bolt type of lock

A

Rim Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The measure of the existing magnetic field on the media after degaussing

A

Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Essential activities to protect business information and can be established in compliance with laws, regulations or corporate governance

A

Records and Information Management (RIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use embedded antenna wires connected to a chip within the card through RF

A

Proximity Card (Prox Card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifies any unacceptable deviation from expected behavior based on known network protocols

A

Protocol Anomaly-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounts granted greater privileges than normal user accounts when it is necessary for the user to have greater control over the system, but where administrative access is not required

A

Power Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card

A

Magnetic Stripe (mag stripe) cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data that are dynamic and exist in running processes or other volatile locations (e.g, system/device RAM) that disappear in a relatively short time once the system is powered down

A

Live evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two or more honeypots on a network

17
Q

A centralized collection of honeypots and analysis tools

18
Q

Decoy servers or systems setup to gather information regarding an attacker or intruder into your system

19
Q

A technology that monitors activity like an IDS but will automatically take proactive preventative action if it detects unacceptable activity

A

Intrusion Prevention System (IPS)

20
Q

A technology that alerts organizations to adverse or unwanted activity

A

Intrusion Detection System (IDS)

21
Q

A focused infrared (IR) light beam is projected from an emitter and bounced off of a reflector that is placed at the other side of the detection area

A

Infrared Linear Beam Sensors

22
Q

The practice of monitoring and potentially restricting the flow of information outbound from one network to another

A

Egress filtering

23
Q

A suite of technologies aimed at stemming the loss of sensitive information that occurs in the enterprise

A

Data Leak Prevention (DLP)

24
Q

A discipline for evaluating, coordinating, approving or disapproving, and implementing changes in artifacts that are used to construct and maintain software systems

A

Configuration Management (CM)

25
A lock controlled by touch screen typically 5 to 10 digits that when pushed in the right combination the lock will relase and allow entry
Cipher Lock
26
The who, what, when, where and how the evidence was handled - from its indentification through its entire life cycle, which ends with destruction, permanent archiving or returning to owner
Chain of Custody
27
Devices that use a magnetic field or mechanical contact to determine if an alarm signal is initiated
Balanced Magnetic Switch (BMS)
28
Accounts that are assigned only to named infividuals that require administrative access to the system to perform maintenance activities and should be different and separate from a user's normal account
Administrator Accounts
29
Device that uses passive listening devices
Acoustic Sensors
30
States that when a crime is committed, the perpetrators leave something behind and take something with them, hence the exchange
Locard's exchange principle
31
A lock or latch that is recessed into the edge of a door, rather that being mounted to its surface
Mortise Lock
32
The party to party litigation costs resulting from its breach of warranties
Indemnification
33
Provide a quick way to disable a key by permitting one turn of the master key to change a lock
Instant Keys
34
Send induced radio frequency (RF) signals down a cable that is attached to the fence fabric
Time Domain Reflectometry (TDR)