What is SCAP?
Security Content Automation Protocol
SCAP is maintained by the National Institute of Standards and Technology (NIST) and consolidates vulnerabilities into a single language for better understanding across different security tools.
What is the main purpose of SCAP?
To allow diverse security tools to identify the same vulnerability using a unified language
What does a vulnerability scanner do?
Identifies devices with vulnerabilities and can automate the patching process
What is the benefit of automating the patching process?
Reduces the need for human intervention and can efficiently manage multiple devices
What organization provides extensive security benchmarks?
Center for Internet Security (CIS)
Their website can be visited at cissecurity.org.
What is a security benchmark?
A set of security best practices that ensures systems are configured securely
What kind of system checks can be performed for compliance?
Agent-based and agentless checks
What is an advantage of agent-based systems?
Always on and running to ensure compliance
What is a disadvantage of agent-based systems?
Requires ongoing maintenance and updates
What is a SIEM?
Security Information and Event Manager
SIEMs consolidate log files to a central database for reporting and analysis.
What is the primary function of a SIEM?
To consolidate log files and create reports on security performance
What types of malware can antivirus and anti-malware tools identify?
Trojan horses, worms, macro viruses, spyware, ransomware, fileless malware
What does DLP stand for?
Data Loss Prevention
What is the purpose of DLP?
To monitor and block the transfer of sensitive data across networks
What protocol is used for monitoring software built into systems?
Simple Network Management Protocol (SNMP)
What is a Management Information Base (MIB)?
A database of information collected on a system monitored by SNMP
What are object identifiers (OID)?
A group of numbers used to identify metrics in a MIB
What is an SNMP trap?
A proactive alert sent from a device to a management station when a specific event occurs
What is NetFlow used for?
Monitoring traffic flows and application use statistics
What type of information does SNMP gather?
Lower level metrics such as utilization and packet counts
True or False: DLP can only be implemented on network appliances.
False
DLP can also be implemented on endpoints and cloud-based systems.
Fill in the blank: The _______ allows for the automation of vulnerability detection and removal.
Security Content Automation Protocol (SCAP)
What happens during an agentless check?
Runs without formal installation and checks compliance upon login or connection
What is a key challenge in maintaining device security?
Constant changes and new vulnerabilities emerging