Monitoring Data & Endpoint Security Flashcards

(13 cards)

1
Q

FIM

A

File integrity monitoring (FIM) → security control that monitors critical files and directories for unauthorized changes, helping detect malware, insider threats, or system tampering by alerting when files are modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SFC

A

System file checker (SFC) → built-in Windows utility that automatically verifies the integrity of protected system files and repairs them if they are altered, acting as an automated form of file integrity monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tripwire

A

Tripwire → file integrity monitoring tool commonly used on Linux systems that detects and alerts on unauthorized changes to system files, configurations, or binaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DLP

A

Data loss prevention (DLP) → security technology that monitors, detects, and blocks sensitive data from being accessed, transmitted, or exfiltrated without authorization across endpoints, networks, or cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

USB Blocking

A

USB blocking → endpoint security control that restricts or disables universal serial bus devices to prevent malware introduction, data exfiltration, or unauthorized device usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoints

A

Endpoints → devices that connect to a network and interact with data, such as desktops, laptops, servers, mobile devices, and tablets, making them common targets for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Edge vs Access Control

A

Edge versus access control → edge controls protect traffic at network boundaries such as firewalls or gateways, while access controls enforce permissions at the user, device, or resource level such as authentication systems or file permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Posture Assessment

A

Posture assessment → evaluation of a device’s security state, including patch level, antivirus status, and configuration, to determine whether it meets security requirements before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Persistent Agents

A

Persistent agents → security agents that remain installed on endpoints continuously, providing ongoing monitoring, visibility, and enforcement of security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dissolvable Agents

A

Dissolvable agents → temporary security agents that are deployed for a short period to assess posture or perform scans and then removed after completing their task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Agentless NAC

A

Agentless network access control (NAC) → access control method that evaluates device security posture without installing software, typically using network scans or authentication checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR

A

Endpoint detection and response (EDR) → advanced endpoint security solution that continuously monitors behavior, detects threats, investigates incidents, and responds to attacks beyond traditional antivirus or intrusion prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XDR

A

Extended detection and response (XDR) → security platform that extends endpoint detection and response by correlating data across endpoints, networks, email, and cloud environments to improve threat detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly