Study Flashcards

1
Q

a non-persistent operating system on a compact disk or USB

A

live boot media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to indicate relevancy to the case or part of the case or to show confidentiality and help organize evidence according to keywords or labels

A

tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.

A

TAP (Test Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a measure of cryptographic unpredictability, higher levels indicating higher security

A

entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are two ways to maximize integrity of the analysis process to ensure non-repudiation is possible?

A
  • use a write-blocker to prevent data from being changed

- create a has before and after analysis and compare checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

shows the results of risk assessments in a comprehensible document format, including impact, likelihood ratings, date of identification, description, countermeasures, owner/route for escalation, and status.

A

risk register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a form of segmentation that routes suspicious traffic that is flooding an IP address into another network for analysis

A

sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

helps to mitigate against spoofing and poisoning attacks. The authoritative server for the zone creates a package of resource records, called an RRset, signed with a private key known as the zone signing key

A

(DNSSEC) DNS Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

standard that creates reports that assess the ongoing effectiveness of the security architecture over a period of 6-12 months. highly detailed and designed to be restricted.

A

Service Organization Control (SOC2) Type II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the concept that fire requires heat, oxygen, and fuel to ignite and burn

A

the fire triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

strategy that uses passive discovery techniques so that threat actors do not know they have been discovered

A

defensive maneuver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are 9 symmetric algorithms?

A
  • DES
  • 3DES
  • IDEA
  • AES
  • Blowfish
  • Twofish
  • RC4
  • RC5
  • RC6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

name 3 asymmetric algorithms

A
  • Diffie-Hellman (DH)
  • RSA
  • ECC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encryption type where 2 keys are used, one to encrypt, the other to decrypt

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encryption type where sender and receiver use the same private key

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cipher that uses key stream generator to encrypt data bit by bit using XOR function to create ciphertext

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cipher that breaks input into fixed length blocks of data and performs encryption on each block

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which symmetric encryption algorithm is a stream cipher?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

type of control that includes policies, procedures, legal, and regulatory

A

administrative controls (aka managerial controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

name for a freelance ethical hacker

A

blue hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

highly trained hackers, funded with covert and open source intelligence or funded by nations

A

Advanced Persistent Threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

4 important factors in intelligence/sources

A
  • timeliness
  • relevancy
  • accuracy
  • confidence levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are the steps of Lockheed Martin’s kill chain?

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Explotation
  5. Installation
  6. Command and Control
  7. Actions on Objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

method of obtaining info through public records, websites, and social media

A

OSINT (Open Source Intelligence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
framework for analyzing incidents and intrusions by exploring relationships between adversary, capability, infrastructure, and victim
Diamond Model of Intrusion Analysis
26
knowledge base for adversary tactics
MITRE ATT&CK Framework
27
a malware infection that sets off a malicious function when logical conditions are met
logic bomb
28
5 steps for securing the BIOS
1. Flash the BIOS (update software) 2. Use a BIOS password 3. Configure boot order 4. Disable external ports and devices 5. Enable secure boot
29
3 tips for securing NAS (Network Attached Storage)
1. use data encryption 2. use proper authentication 3. log NAS access
30
technology that provides automated identification of suspicious activity using AI and machine learning
UEBA (User and Entity Behavior Analytics)
31
attack where unsolicited messages are sent to bluetooth devices
bluejacking
32
attack involving the unauthorized access of info from wireless device over bluetooth
bluesnarfing
33
an encryption method that provides a small footprint and/or low computational complexity for resource-constrained systems such as an Internet of Things (IoT) device.
lightweight cryptography
34
the manual review of code to identify oversights, mistaken assumptions, or a lack of knowledge or experience. This may ensure security or improve the code depending on who is peer-reviewing it.
static code analysis
35
a tool that is placed between an organization’s resources and a cloud service provider that enforces defined security-based policies while monitoring traffic
CASB (Cloud Access Security Broker)
36
a database of information about vulnerabilities that are codified as signatures.
CVE (Common Vulnerabilities and Exposures)
37
used to monitor social media for incidents, such as disgruntled consumers posting negative content. In terms of security, this can be used to gather threat intelligence.
sentiment analysis
38
an appliance designed to perform centralized public key infrastructure (PKI) management, key generation, or key escrow for devices
HSM (Hardware Security Module)
39
a phishing attack conducted through a voice channel (telephone or VoIP, for instance)
Vishing
40
an encryption method that allows computation to be performed directly on encrypted data without requiring access to a secret key. Analysis can apply functions on encrypted data without needing to reveal the values of the data
Homomorphic encryption
41
lists every person who has worked with or who has touched the evidence that is a part of an investigation
chain of custody
42
collecting information that is widely and openly available from publicly available sources
passive reconnaissance
43
Put the following in order evidence should be collected based on volatility: - swap file - processor cache - hard drive or usb drive - random access memory
1. Processor cache 2. Random Access Memory 3. Swap File 4. Hard Drive or USB Drive
44
information about a subject's opinions, beliefs, and nature afforded specially protected status by privacy legislation
SPI (Sensitive Personal Information)
45
a pattern matching technique that uses a structured database of string values to detect matches; may use format or sequence
EDM (Exact Data Match)
46
used to enable access to a directory of resources and uses a client-server model for mutual authentication
LDAPS
47
access control type that requires all access to be predefined based on system classification, configuration, and authentication
MAC (Mandatory Access Control)
48
nslookup command that requests DNS records for only the name servers
set type=ns
49
most common vulnerability found on Windows and Linux systems
missing patches
50
fire extinguishing system commonly used in data centers and server rooms to protect the servers from fire
FM-200
51
a popular vulnerability scanner that can be used to check how vulnerable your network is by using various plugins to test for vulnerabilities, and perform compliance auditing
Nessus
52
a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development
Metasploit
53
United States federal law that requires financial institutions to explain how they share and protect their customers’ private information
The Gramm-Leach-Bliley Act (GLBA)
54
a United States federal law that sets new or expanded requirements for all US public company boards, management, and public accounting firms
Sarbanes-Oxley (SOX)
55
United States federal law that governs the access to educational information and records by public entities such as potential employers, publicly funded educational institutions, and foreign governments
Family Educational Rights and Privacy Act (FERPA)
56
creates perfect copies or forensic images of computer data without making changes to the original evidence. The forensic image is identical in every way to the original, including copying the slack, unallocated, and free space on a given drive
FTK Imager
57
data sanitization technique that involves overwriting data once (and seldom more than three times) with repetitive data (such as all zeros) or resetting a device to factory settings
Clearing
58
a system on a network used to access and manage devices in a separate security zone
jumpbox
59
a complete suite of wireless security assessment and exploitation tools that includes monitoring, attacking, testing, and cracking of wireless networks
Aircrack-ng
60
creates a reverse shell from a victimized machine back to an attacker.
Netcat
61
a public key certificate that can be used with multiple subdomains of a domain. This saves money and reduces the management burden of managing multiple certificates, one for each subdomain
wildcard certificate
62
a centralized solution that allows administrators to create and enforce policies for mobile devices, such as pushing updates, preventing certain apps, and turning functions on/off
MDM (Mobile Device Management)
63
a means of separating personal and work data
storage segmentation
64
The four steps of patch management
1. Planning 2. Testing 3. Implementing 4. Auditing
65
a method of creating a policy to deploy across a large number of devices
GPO (Group Policy Object)
66
cryptographic module embedded in a computer to enforce trusted execution and attest to boot settings and metrics
Root of Trust (ROT)
67
UEFI feature that gathers secure metrics to validate the boot process in an attestation report
measured boot
68
type of attack where the attacker breaks out of a normally isolated VM by interacting directly with the hypervisor
VM escape
69
contents of a virtual machine that exist as deleted files on a cloud based server after the deprovisioning of a virtual machine
data remnants
70
authentication protocol that works based on tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner
Kerberos
71
authentication protocol in which users supply authentication information to authentication client devices, which are then passed to an AAA server that processes the request
RADIUS
72
regulation that applies to companies of any size that accept credit card payments
PCI-DSS (Payment Card Industry Data Security Standard)
73
password-based authentication protocol that is widely used as an authentication method in PPTP-based (Point to Point Tunneling Protocol) VPNs and can be used with EAP
MS-CHAP v2 (Microsoft Challenge Handshake Authentication Protocol version 2)
74
a framework in a series of protocols that allows for numerous different mechanisms of authentication, including things like simple passwords, digital certificates, and public key infrastructure
EAP (Extensible Authentication Protocol)
75
positioned at the cloud network edge and directs traffic to cloud services if the contents of that traffic comply with the policy.
reverse proxy
76
what is Cain and Abel used for?
password cracking
77
attack that uses a single ping with a spoofed address sent to the broadcast address of a network, causing them to respond to the spoofed address and overwhelm the victim with responses to the initial ping
smurf
78
the team assigned the role of judge, enforcing rules and handling requests and issues in a cybersecurity training exercise
white team
79
encryption algorithms that break input into 64 bit blocks
DES, IDEA, Blowfish
80
encryption algorithm that uses 128 bit, 192 bit, 256 bit blocks
AES
81
encryption algorithm that uses 128 bit blocks
Twofish
82
encryption algorithm that uses a variable key size of 40 bits to 2048 bits
RC4
83
type of attacker that usually quietly gathers information from compromised systems
APT
84
involves removing sensitive data from a hard drive using the device's internal electronics or an outside source such as a degausser, or by using a cryptographic erase function if the drive supports one. data cannot be recovered even in a lab environment
purging
85
use of a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media, and may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse. some tools may allow data recovery
data wiping/clearing
86
a cloud deployment model where the cloud consumer uses multiple public cloud services
multi-cloud
87
describes the overall accuracy of a biometric system, and the point where the False Reject Rate (FRR) and False Accept Rate (FAR) are equal
crossover error rate
88
a hardware-based cryptographic processing component that is a part of the motherboard
TPM (Trusted Platform Module)
89
shared authentication protocol designed to facilitate the sharing of information (resources) within a user profile between sites
OAuth
90
an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields
Open ID Connect (OIDC)
91
utility that assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies
Hping
92
most secure protocol for use with VPNs
IPsec
93
a method employed by many computer anti-virus programs designed to detect previously unknown computer viruses and new variants of viruses already in the wild. This is behavior-based detection and prevention, so it should detect the issue and stop it from spreading throughout the network
Heuristic analysis
94
open-source intelligence provider that allows you to quickly analyze suspicious files and URLs to detect types of malware. It then automatically shares them with the security community
VirusTotal
95
a special utility provided with some solid-state drives that can perform the sanitization of flash-based devices
secure erase
96
method of sanitization in which storage media is encrypted by default, and the encryption key itself is destroyed during the erasing operation. offers used with solid state drives
cryptographic erase (CE)
97
conducted by actively connecting to the server using telnet or netcat and collecting the web server's response. This banner usually contains the server's operating system and the version number of the service being run
banner grabbing
98
how do you calculate Single Loss Expectancy (SLE)?
Asset Value (AV) x Risk Factor (RF)
99
how do you calculate Annual Loss Expectancy (ALE)?
Single Loss Expectancy (SLE) x Annual Rate of Occurrence (ARO)
100
techniques used to make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources it takes to test each possible key
key stretching
101
XML-based framework for exchanging security-related information such as user authentication, entitlement, and attributes; a solution for providing single sign-on (SSO) and federated identity management
SAML (Security Assertions Markup Language)
102
What does a User-Agent request a resource from when conducting a SAML transaction?
Service Provider (SP)
103
used to facilitate incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment
SOAR (Security Orchestration Automation and Response)
104
Port number that is encrypted by default for LDAP
Port 636
105
netcat command that signifies listening and a listening port
-l -p
106
which type of attack may insert an always true statement (eg 7 == 7)
SQL injection
107
if port 443 is in use, which protocols would you expect to see used?
HTTPS, SSL, or TLS
108
an automated software assessment technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions (crashes), failing built-in code assertions, or finding potential memory leaks
fuzzing
109
type of scan that is generally unable to detect many vulnerabilities on a device
uncredentialed scan
110
role that is primarily responsible for data quality. This involves ensuring data are labeled and identified with appropriate metadata. That data is collected and stored in a format and with values that comply with applicable laws and regulations
data steward
111
role that handles managing the system on which the data assets are stored. This includes responsibility for enforcing access control, encryption, and backup/recovery measures
data custodian
112
role that is responsible for oversight of any PII/SPI/PHI assets managed by the company.
privacy officer
113
authentication system that uses a username and password
PAP (Password Authentication Protocol)
114
why is SMS unsecure?
it may be accessible to attackers via VoIP or other systems, and is unable to be encrypted
115
when should you schedule vulnerability scans of an organization's data center?
during periods of low activity
116
During which incident response phase is the preservation of evidence performed?
containment, eradication, and recovery
117
biometric authentication factor that relies on matching patterns on the eye's surface using near-infrared imaging; most accurate and least intrusive of the eye scans
iris scan
118
an attack combining the dictionary and brute force methods into a single tool
hybrid attack
119
hashing algorithm that creates a 160-bit fixed output
RIPEMD
120
hashing algorithm that creates a 256-bit fixed output
SHA-2
121
two hashing algorithms that create a 128-bit fixed output
NTLM and MD-5
122
the least secure wireless security and encryption protocol
WEP
123
tool that could be used to detect unexpected output from an application being managed or monitored
behavior-based analysis tool
124
world's most popular open-source port scanning utility
nmap
125
conducted by walking around a build while locating wireless networks and devices
war walking
126
process of harvesting an account's cached credentials when the user logs in to a single sign-on (SSO) system
Pass the Hash (PtH)
127
a cybersecurity issue that occurs when a web application developer uses an identifier for direct access to an internal implementation object but provides no additional access control and/or authorization checks
Insecure direct object references (IDOR)
128
the most detailed and explicit type of access control over a resource because it is capable of making access decisions based on a combination of subject and object attributes, as well as context-sensitive or system-wide attributes
Attribute-based access control (ABAC)
129
analysis framework makes no allowance for an adversary retreat in its analysis
The Lockheed Martin cyber kill chain
130
most secure access control method
MAC (Mandatory Access Control)
131
inspects the code for possible errors and issues without actually running the code
static code analyzer
132
security policy that could help detect fraudulent cases that occur even when other security controls are already in place
mandatory vacation
133
software that detects potential data breaches/ data exfiltration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use, in motion, and at rest
Data Loss Prevention (DLP) Software
134
command is used to display information about the current wired network connection on a Linux system, including its IP address, subnet mask, and MAC address
ip
135
a type of virus that use various techniques to protect it from being reverse engineered. This includes changing its code during execution and encrypting its payloads
armored virus
136
protects against web application vulnerabilities like SQL injections
WAF (Web Application Firewall)
137
an automated version of a playbook used by a SOAR to have the system conduct as many steps as possible
runbook
138
what encryption algorithm is NOT PKI x.509 compliant and cannot be used in various secure functions
Blowfish
139
Cisco's replacement for LEAP. It addresses LEAP vulnerabilities using TLS (Transport Layer Security) with PAC (Protected Access Credential) instead of certificates
EAP-FAST (Flexible Authentication via Secure Tunneling)
140
uses a server-side public key certificate to create an encrypted tunnel between the supplicant and authentication server; industry standard.
PEAP (Protected Extensible Authentication Protocol)
141
a secure hash of a password sent to the authenticating server. By itself, this does not provide mutual authentication from the client to the supplicant.
EAP-MD5
142
multiple organizations allow access to each other's users by joining their RADIUS servers into a RADIUS hierarchy
RADIUS federation
143
the attacker captures some data used to log on or start a session legitimately. The attacker then disrupts the legitimate session and resends the captured data to re-enable the connection
replay attack
144
a type of brute force attack aimed at exploiting collisions in hash functions. The purpose of this type of attack is to forge a digital signature.
birthday attack
145
an attack that can facilitate a Man-in-the-Middle (MitM) attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths
downgrade attack
146
the process of extracting data from a computer when that data has no associated file system metadata
carving
147
occurs when a software product will no longer be produced or sold. These products are most likely to be replaced by a newer version or model.
EOL (End of Life)
148
occurs when a product will no longer be supported by a vendor. Updates and patches will no longer be produced
EOS (End of Service life)
149
an outdated computing software or hardware that is still in use. but generally will receive no support or maintanance
legacy system
150
the five functions referenced by the NIST
Identify, Protect, Detect, Respond, Recover
151
devices that perform some pre-processing of data to and from edge devices to enable prioritization. They also perform the wired or wireless connectivity to transfer data to and from the storage and processing networks
edge gateways
152
the process in which a product is continually tested throughout the development lifecycle to ensure it is meeting the functional and security goals of a customer
continuous validation
153
the process of delivery of software to a production environment using automation reducing the software development lifecycle
continuous deployment
154
provides encryption and authentication for RTP (Real-Time Protocol) data in unicast and multicast data flows. will encrypt all data sent and received by each SIP endpoint for the entire journey; can be used to encrypt VoIP calls
SRTP (Secure Real-time Transport Protocol)
155
protocol that uses digital certificates to authenticate the endpoints and establish a TLS tunnel
SIP (Session Initiation Protocol) (or SIPS, the secure version)
156
what software development security feature is commonly known as stack protection and does not execute the source code?
complier
157
which generation of antivirus software is characterized by signature-based detection and prevention of known viruses?
first generation antivirus software
158
which generation of antivirus software can detect other malicious software such as Trojans, spyware, and crypto jackers?
anti-malware software
159
what piece of technology features application aware filtering?
firewalls
160
penetration technique that uses remote access and tunneling protocols to bypass a network boundary and compromise servers on an internal network
pivot
161
an asymmetric cryptographic key that is generated for each execution of a key establishment process.
ephemeral key
162
an encryption method that allows computation to be performed directly on encrypted data without requiring access to a secret key. Analysis can apply functions on encrypted data without needing to reveal the values of the data.
homomorphic encryption
163
secure areas that protect resources against unauthorized users and spillage of information, utilizing a host that is not physically connected to any network
air gap
164
which data state will require the encryption keys stay safe for the longest period of time?
data at rest
165
an attack where an attacker, with access to the network, redirects an IP address to the MAC address of an unintended computer, allowing them to sniff all traffic on a switched network
ARP poisoning
166
two terms that refer to a document that guides investigators to determine priorities and remediation plans by listing the procedures, contacts, and resources available to responders for various incident categories
Incident Response Plan or Runbook
167
occurs when a tester is provided full details of a system including the source code, diagrams, and user credentials in order to conduct the test
white-box testing
168
Occurs when a tester is not provided with any information about the system or program prior to conducting the test
black-box testing
169
Linux command that allows for viewing the entire contents of one or more files
cat
170
Linux command that outputs the first 10 lines of a provided file by default. This can be adjusted to output more or fewer lines using the -n switch
head
171
Linux command that outputs the last 10 lines of a provided file by default. This can be adjusted to output more or fewer lines using the -n switch
tail
172
method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize man-in-the-middle attacks.
pinning
173
Allows the certificate holder to get the OCSP record from the server at regular intervals and include it as part of the SSL or TLS handshake
OCSP Stapling
174
A protocol that allows you to determine the revocation status of a digital certificate using its serial number
OCSP (Online Certificate Status Protocol)
175
a command-line tool to transfer data to or from a server using supported protocols, such as HTTP, FTP, or IMAP. It is commonly used in web scrapers or for downloading files from the web to local storage
curl
176
a device that converts mechanical energy into electrical energy for use in a peripheral circuit, and is an expensive option for power failover and do not immediately provide power
generator
177
convincingly useful but actually fake data. This data can be made trackable, so that when a threat actor successfully exfiltrates it, the attempts to reuse or exploit it can be traced
honeyfile
178
two things to note about any time offset when performing analysis on a breached system
daylight savings time and UTC
179
an asymmetric public and private key-based cryptographic technique for encrypting data. generates keys through the properties of a special equation providing smaller and more efficient cryptographic key processes.
Elliptic curve cryptography (ECC)
180
three places where one might find operating system files during acquisition
cache, pagefile, RAM
181
what two integrity concepts utilize the TPM?
- boot attestation | - measured boot
182
a header option that forces the browser to connect using HTTPS only, mitigating downgrade attacks, such as SSL stripping
HTTP Strict Transport Security (HSTS)
183
a header option that mitigates clickjacking, script injection, and other client-side attacks
Content Security Policy (CSP)
184
provides a vector a popular social engineering technique that drops infected USB media around college campuses. also used for war flying.
UAV (Unmanned Aerial Vehicle) aka drone
185
four core features of the Diamond Model of Intrusion Analysis
adversary, capability, infrastructure, and victim
186
two configurations to increase router security
1. block source routed packets | 2. message authentication
187
category of control that gives oversight of an information system. Examples could include risk identification or a tool allowing the evaluation and selection of other security controls.
managerial control
188
category of control that is implemented primarily by people rather than systems. For example, a security guard
operational control
189
nmap command that is a fast technique also referred to as half-open scanning, as the scanning host requests a connection without acknowledging it. The target's response to the scan's SYN packet identifies the port state
-sS
190
nmap command that scans scan UDP ports. As these do not use ACKs, Nmap needs to wait for a response or timeout to determine the port state, so UDP scanning can take a long time. A UDP scan can be combined with a TCP scan.
-sU
191
nmap command to specify a port range.
-p
192
how many commonly used ports does an nmap scan by default?
1000
193
nmap scan to find open ports
-o
194
type of data that is too valuable to allow any risk of capture; may be top secret. escalate any breeches immediately
critical data
195
an electronic device that records information and communicates the information to the consumer remotely.
smart meter
196
a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function
embedded system
197
mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient's email client at their convenience
POP3
198
a digital file accurately representing the contents and configuration of a disk volume or a whole data storage unit, including a bootloader and operating system (OS)
disk image
199
a point-in-time copy of data maintained by the file system and are commonly live acquisitions. has less validity than a disk image
snapshot
200
what are some reasons you might choose to use a stateless firewall?
ease of set up with basic rules, block certain ports, set rules for protocol ID or type
201
a cloud network hub that allows users to interconnect virtual private clouds (VPC) and on-premises networks through a central console.
transit gateway
202
a set of specifications that defines a management interface for a host application to activate, provision, and manage encryption of user data on self-encrypting drives (SED)
Opal security subsystem class
203
control type that serves as a substitute for a principal control, as recommended by a security standard, and affords the same (or better) level of protection
compensating control
204
control type that acts to eliminate or reduce the likelihood that an attack can succeed. It operates before an attack can take place. An example of this control type is a lock
preventative control
205
control type that acts to eliminate or reduce the impact of an intrusion event. is used after an attack
corrective control
206
three common constraints of embedded systems
- cryptographic capability - network range - compute power
207
publications from the Internet Engineering Task Force (IETF) and other related bodies or organizations that detail how certain technologies are used and their best practices
Request for Comments (RFC)
208
a proxy-based firewall, content filter, and intrusion detection/prevention system that mediates user access to Internet sites and services
SWG (Secure Web Gateway)
209
the principle that developers should commit and test updates often, such as every day or sometimes even more frequently.
Continuous integration
210
the level of risk before any type of mitigation has been attempted
inherent risk
211
the likelihood and impact of risk after specific mitigation, transference, or acceptance measures have been applied
residual risk
212
allows compatible scanners to determine whether a computer meets a configuration baseline
SCAP (Security Content Automation Protocol)