Test Incident Plans & Certifications Flashcards

1
Q

Tabletop exercises

A

Simulate scenarios in a discussion-based setting, allowing team members to walk through their roles and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Walkthroughs

A

Conduct step-by-step reviews of the response procedures with key team members to identify gaps or inefficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simulation exercises

A

Use simulated cyberattacks or incidents to test technical and procedural responses in a controlled environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Full-scale drills

A

Conduct comprehensive, realistic exercises involving multiple teams and stakeholders to validate the overall effectiveness of your response plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Red team exercises

A

Engage a team of ethical hackers to simulate real-world attacks and test your defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-repudiation

A

security principle that ensures a party cannot deny the authenticity of their signature on a document or a sent message. (achieved through digital signatures and audit logs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSL/TLS certificates

A

These secure website communications by encrypting data between the browser and server, ensuring safe and private browsing. Common examples include EV (Extended Validation), DV (Domain Validation), and OV (Organization Validation) certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code signing certificates

A

These validate that software or applications come from a trusted source and haven’t been altered. Developers use them to sign codes to prevent tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client certificates

A

Used to authenticate individuals to a server, often in corporate environments for secure VPN access or email encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email certificates (S/MIME)

A

Secure email communications by providing encryption and digital signatures, ensuring that email content remains confidential and unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Query the active directory

A

How many users have not changed their password in last x min

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Salting

A

adding a unique, random string of characters (salt) to each password before hashing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key stretching

A

technique involves applying a hash function multiple times to a password to make it computationally expensive for attackers to crack passwords using brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly