Wrong answers Flashcards

1
Q

MTTR

A

Mean Time to Restore/Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mean Time to Restore (MTTR)

A

The amount of time required to get
back up and running. This is sometimes called Mean Time To Repair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPO

A

Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery Point Objective (RPO)

A

A recovered system may not be completely repaired, but it will be running well enough to maintain a certain level of
operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RTO

A

Recovery Time Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recovery Time Objective (RTO)

A

A GOAL of time to get back up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WAF

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Web Application Firewall (WAF)

A

Only allows a zip code in a zip code field. Prevents SQL injections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Processor

A

Performs an action with/to the data. Often a third party or small group within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Owner

A

an executive that is ultimately responsible for the use and security of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Controller

A

Manages the data. Often the human resources dept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Custodian

A

Responsible for the accuracy, privacy, and security of the data. Often IT dept or someone whose sole job is data custodian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTOS

A

Real Time Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Real Time Operating System (RTOS)

A

Needs to operate immediately, such as emergency breaking system in a vehicle or a military machine, device or function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Orchestration

A

Large-scale automation or automating processes between
different systems.
(completing the script of generating IT tickets to correct depts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Due diligence

A

The investigation performed on a third party prior to doing business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Role-based access controls

A

Used to associate a job function with a set of rights and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Device certificate

A

can be used to verify the ownership of a remote system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fail Over

A

When one system fails, an operational backup takes its place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewall

A

Firewall rules must be
built to match the traffic flows, and only then will traffic pass through the
firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HA (High Availability)

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UPS (Uninterruptable Power Supply)

A

Uninterruptable Power Supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VPN concentrator

A

used as an endpoint to
an endpoint VPN solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ARO (Annualized Rate of Occurrence)

A

Annualized Rate of Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

AV (Asset Value)

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

EF (Exposure Factor)

A

Exposure Factor, a percentage of asset lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SLE (Single Loss Expectancy)

A

Single Loss Expectancy, dollar amount lost to a single event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ALE (Annualized Loss Expectancy)

A

Annual Loss Expectancy, dollar amount lost to all events in a year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

WCF (Web Content Filtering)

A

Blocks malicious websites, inexpensive, easy to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

DNS Filtering (Domain Name System Filtering)

A

Blocks users from visiting malicious websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

802.1X

A

Authenticates user before user can gain access to the network- does not encrypt data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

WPA3

A

Authenticates user and encrypts data over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

RADIUS

A

Authenticates user credentials, any login page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Port 443

A

HTTPS secure encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Port 80

A

HTTP not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

SCAP (Security Content Automation Protocol)

A

Automates validation and patching of security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

DSA (Digital Signature Algorithm)

A

Provides integrity, authentication, and non-repudiation. Opposite of encrypting information, sender sends with private key. Receiver verifies with public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SSH

A

Secure compared to Telenet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

FTPS (Secure File Transfer Protocol)

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SSL/TLS

A

All the power of your browser with encryption from HTTPS Port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

AES (Advanced Encryption Standard)

A

Advanced Encryption Standard, a symmetrical encryption

43
Q

Passive Reconaissance

A

Searching social media etc

44
Q

Active Reconnaissance

A

Penetration testing

45
Q

DMARC

A

Specifies spam emails

46
Q

SPF (Sender Policy Framework)

A

List of authorized/trust email senders

47
Q

NAC (Network Access Control)

A

Only allowing authorized users with the help of EAP and IEEE 802.1X

48
Q

DKIM

A

Validates digitally signed emails

49
Q

Federation

A

Using a third party to log into a site, like using Google account to log into Pinterest

50
Q

Journaling

A

Saves a copy as a middle man in case data goes down before getting posted

51
Q

Resource Provisioning

A

Automated employee permissions related to onboarding/offboarding

52
Q

Business Continuity

A

Plan B for when Plan A tech no workie

53
Q

DNS Posioning

A

Attackers impersonating DNS to user by taking on IP address of DNS. Can also direct user to malicious websites

54
Q

Enumeration

A

Documenting list of all parts in a device

55
Q

IaC

A

Infrastructure as Code

56
Q

AUP

A

Acceptable use Policy

57
Q

SASE

A

Secure Access Service Edge- VPN for cloud services

58
Q

NAT

A

Network Address Translation- assigning same IP address to a group of computers

59
Q

UTM

A

all-in one device, expensive, router, IPS, firewall combined. can limit overall bandwidth

60
Q

SCADA/ICS

A

network connecting large pieces of machinery in industrial environments, such as power plants, manufacturing, mining

61
Q

VM Virtual Machines

A

Only share hardware resources

62
Q

Containerized deployments

A

Share kernal operating systems, less secure than VM for this reason

63
Q

DLP

A

Data Loss Prevention- could be in rest or in motion, blocking sensitive data in real time

64
Q

Input validation

A

Input validation can be used to create a very specific filter of
allowed input,

65
Q

Static code analyzer

A

A static code analyzer is useful when evaluating the security of existing
source code.

66
Q

Secure cookies

A

Secure cookies ensure the information contained in the browser cookie is encrypted and only viewable by the end user.

67
Q

Snapshot

A

Virtual machines (VMs) have a snapshot feature to capture both a full backup of the virtual system and incremental changes that occur over time.
It’s common to take a snapshot of a VM for backup purposes or before
making any significant changes to the VM.

68
Q

Owner

A

The owner of an object controls access in a discretionary access control model.

69
Q

Administrator

A

Administrators generally label objects when using mandatory access
control, but they are not involved with discretionary access control.

70
Q

OCSP (Online Certificate Status Protocol) Stapling

A

Stapling allows the certificate
holder verify their own certificate status. The OCSP status is commonly
“stapled” into the SSL/TLS handshake process. Instead of contacting the
certificate authority to verify the certificate, the verification is included
with the initial network connection to the server.

71
Q

Wildcards

A

Wildcards are added to certificates for use across multiple devices associated with the same domain name.

72
Q

Directory traversal

A

Directory traversal attempts to read or access files outside the scope of
the web server’s file directory. Look for a pair of dots in a file path (../)

73
Q

LDAP (Lightweight Directory Access Protocol)

A

a common standard
for authentication. LDAP is an open standard and is available across many different operating systems and devices.

74
Q

DES and WEP

A

Older, weak encryption

75
Q

Replay attack

A

A replay attack uses previously transmitted information to gain access to an application or service. This information is commonly captured in network PACKETS and replayed to the service.

76
Q

SOW

A

A SOW (Statement of Work) is a detailed list of tasks, items, or processes to be completed by a third-party. The SOW lists the job scope, location, deliverables, and any other specifics associated with the agreement. The SOW is also used as a checklist to verify the job was completed properly by the service provider.

77
Q

SLA

A

An SLA (Service Level Agreement) sets the minimum terms of service
between a customer and a service provider. This agreement often contains
terms for expected uptime, response time requirements,

78
Q

BPA

A

A BPA (Business Partners Agreement) is used between entities going into
business together.

79
Q

MOU

A

A Memorandum of Understanding, states common goals, not legally binding

80
Q

MOA

A

Memorandum of Agreement, next step above a MOU, both sides agree to objectives, sometimes legally binding, sometimes not

81
Q

MSA

A

Master Service Agreement, legal contract, sets the terms, above MOU AND MOA

82
Q

Air-gapped

A

An air-gapped network would be physically isolated from other networks. Air gapped networks
are commonly used to separate networks that must never communicate to each other.

83
Q

SD-WAN

A

An SD-WAN (Software Defined Networking in a Wide Area Network)
network allows users to efficiently communicate directly to cloud-based
applications

84
Q

Jump server

A

A jump server is often used to allow external access to internal devices,
commonly for maintenance or administrative tasks.

85
Q

Non-repudiation

A

Non-repudiation is used to verify the source of data or a message. Digital
signatures are commonly used for non-repudiation.

86
Q

Containment

A

The containment phase isolates events which can quickly spread and get out of hand.

87
Q

Eradication

A

Eradication focuses on removing the cause of the event and restoring the
systems back to their non-compromised state.

88
Q

would be the MOST effective use of
asymmetric encryption?

A

Create a shared session key without sending the key across the network.

89
Q

Data sanitization

A

Data sanitization involves the complete removal of data without any method of recovery.

90
Q

data inventory

A

A data inventory describes a list of all data managed by an organization.

91
Q

Metadata

A

Metadata is data which describes other data sources. Email header
information, network headers,

92
Q

Forward proxy/proxy server

A

A proxy server can be used to monitor incoming and outgoing network communication. Proxy servers can be used to identify malicious software, filter content, or increase performance through file caching

93
Q

OSINT

A

OSINT (Open Source Intelligence) is information gathered from publicly
available sources such as social media sites, online forums,

94
Q

SCAP

A

SCAP (Security Content Automation Protocol) is a standard method used
by security tools to identify and act on the same criteria.

95
Q

Internal self-assessment

A

An internal self-assessment with audit can verify users have the correct permissions and all users meet the practice of least privilege.

96
Q

Account de-provisioning

A

the disabling of an account and archiving of user information. This process usually occurs when an employee has left the organization.

97
Q

VLAN

A

A VLAN (Virtual Local Area Network) is a logical method of segmenting
traffic within network switches. Although this segmentation is effective, it’s not as secure as an air gap.

98
Q

CYOD

A

CYOD (Choose Your Own Device) employer buys device

99
Q

COPE

A

Corporately Owned, Personally Enabled devices are purchased
by the company and deployed to the users.

100
Q

BYOD

A

BYOD (Bring Your Own Device) is a model where the employee owns
the mobile device but can also use the same device for work.

101
Q

Router

A

Routers forward traffic between separate IP subnets or VLANs, and use the destination IP address to determine which interface on the router will be used

102
Q

Proxy

A

Intercept all browser requests and cache the results

103
Q
A