Week 5/6 Flashcards

1
Q

Defense in depth

A

The concept of having multiple, overlapping systems of defense to protect IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack vector

A

Method or mechanism by which an attacker or malware gains access to a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack surface

A

Sum of all the different attack vectors in a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host based firewalls

A

Protect individual hosts from being compromised when they’re used in untrusted, potentially malicious environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIEMS

A

Centralized log server for security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Full disk encryption

A

Works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to undo the conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key escrow

A

Allows the encryption key to be securely stored for later retrieval by an authorized party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The six PCI DSS objectives

A
  1. Build and maintain a secure network and systems
  2. Protect cardholder data
  3. Maintain a vulnerability management program
  4. Implement strong access control measures
  5. Regularly monitor and test networks
  6. Maintain an information security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security in an IT setting

A

Determining risks or exposure; understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerability scanner

A

A computer program designed to assess computers, computer systems, networks or applications for weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penetration testing

A

The practice of attempting to break into a system or network to verify the systems in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy policies

A

Oversee the access and use of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data handling policies

A

should cover the details of how different data is classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fist step in handling an incident?

A

Detecting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Second step of incident handling?

A

Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the last three things to consider when handling an incident?

A

Severity, impact, and recovery

17
Q

Data exfiltration

A

The unauthorized transfer of data from a computer