2.5 Cybersecurity Mitigation Techniques and Best Practices Flashcards

(29 cards)

1
Q

What is the definition of Mitigation?

A

The process of reducing the impact of a security event or a potential security event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of patching known vulnerabilities?

A

Stops attacks before they happen by fixing known weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the benefits of patching?

A
  • Increases system security
  • Increases system stability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three sources of patches.

A
  • Microsoft (monthly)
  • Application developers
  • Device manufacturers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does home system patching differ from organizational patching?

A

Home systems often patch automatically, while organizations test patches before deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are emergency patches?

A

Issued for significant vulnerabilities being actively exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is File-Level Encryption (EFS)?

A

Encrypts specific files or folders and is built into the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Full Disk Encryption (FDE)?

A

Encrypts an entire storage volume, including the operating system and user files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is Full Disk Encryption (FDE) especially critical?

A

For devices leaving the building or when there are concerns about physical access to storage drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Application-Level Encryption?

A

Applications encrypt data themselves, independent of file system or full disk encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is constant monitoring and logging important?

A

To identify security events as they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technology consolidates logs from various sources?

A

Security Information and Event Manager (SIEM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the principle of Least Privilege?

A

Assigning users only the rights and permissions necessary for their specific job role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of the principle of Least Privilege?

A

Minimize the potential impact of a compromised user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a best practice regarding user permissions?

A

Avoid users running with administrative permissions; elevate permissions temporarily when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Posture Assessment?

A

Enforces system configuration requirements for devices connecting to the network.

17
Q

What actions can be taken for non-compliance in a Posture Assessment?

A
  • Quarantining the system
  • Placing it in a private VLAN for remediation
18
Q

What is the importance of decommissioning equipment safely?

A

Removing sensitive information from devices at the end of their usable lifetime.

19
Q

What are two methods for data removal from storage drives?

A
  • Physically removing the drive
  • Wiping or formatting the drive
20
Q

What is the role of SIEM in cybersecurity?

A

Consolidates logs from various sources into a central location for reporting and monitoring.

21
Q

What does encryption do?

A

Converts information or data into a code to prevent unauthorized access.

22
Q

What is the function of EFS?

A

Microsoft’s file-level encryption feature integrated into the Windows operating system.

23
Q

What is BitLocker?

A

Microsoft’s full disk encryption feature for Windows operating systems.

24
Q

What is FileVault?

A

Apple’s full disk encryption feature for macOS operating systems.

25
What does logging involve?
Recording events and activities that occur on a system or network.
26
What is the purpose of a posture assessment?
Checks security configuration and health of a connecting system against predefined policies.
27
What does EDR stand for?
Endpoint Detection and Response.
28
What is a VLAN?
A logical subdivision of a network that allows devices to be segmented and isolated.
29
What is the process of drive destruction?
The physical obliteration of a storage drive to ensure that data cannot be recovered.