Security Tools Flashcards

1
Q

Security Content Automation Protocol (SCAP)

A

a suite of specifications developed by the National Institute of Standards and Technology (NIST) to provide a standardized approach for automating the assessment, monitoring, and reporting of security vulnerabilities and configurations in information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agent

A

a software component or application that is installed on a device (such as a server, workstation, or network device) to perform specific tasks related to monitoring, management, security, or data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agentless

A

a method of monitoring, managing, or securing systems without the need to install a dedicated software agent on each device or endpoint. Instead of relying on agents to perform tasks such as data collection, vulnerability scanning, or configuration management, agentless solutions typically utilize other techniques, like network protocols or APIs, to interact with and gather information from devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SIEM Security information and event manager

A

comprehensive solution for managing security data across an organization. It collects, analyzes, and correlates security events from various sources, providing a centralized view of the security posture of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-virus

A

a type of application designed to detect, prevent, and remove malware from computers and networks. It plays a critical role in cybersecurity by protecting systems from various forms of malicious software, including viruses, worms, trojans, ransomware, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-malware

A

software specifically designed to detect, prevent, and remove various types of malicious software (malware), which includes viruses, worms, trojans, ransomware, spyware, adware, and more. A broader range of threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Loss Prevention (DLP)

A

a cybersecurity solution that monitors and prevents the unauthorized sharing, transfer, or use of sensitive data. DLP can help organizations protect their data across on-premises systems, cloud-based locations, and endpoint devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Simple Network Management Protocol (SNMP)

A

an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, network switches, servers, workstations, printers, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Netflow

A

is a network protocol developed by Cisco for collecting IP traffic information and monitoring network flow. By analyzing NetFlow data, you can get a picture of network traffic flow and volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly