OS Process Management Flashcards

Day2_Explaining Patch Management Concepts (13 cards)

1
Q

Which tool can be used to view and modify the Windows registry?

A

Regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your Windows server performance has degraded significantly. You need to determine if a specific service is consuming most of the CPU time. Which tool should you use?

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which hardware security component can be used to store BitLocker encryption keys?

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a Windows data collector set (DCS) differ from using Performance Monitor?

A

A DCS can be scheduled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Patching

A

Patching involves applying updates to
software and systems to address
vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four steps in the Patch Management Process?

A
  1. Scan for vulnerabilities
  2. Examine vulnerability and identify missing patches
  3. Deploy patches
  4. Generate status report on patch update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four sub-categories of Configuration Management?

A
  • Baseline
  • Identification
  • Version control
  • Auditing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Risk Management Principles?

A
  • Accept: acknowledge and accept certain risks when they are within tolerance levels
  • Transfer: shift risk to another party through insurance or outsourcing
  • Avoid: eliminate risks by not engaging in activities that pose the risk
  • Mitigate: reduce or control risks through security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define policies and governance

A
  • Policies: Guidelines and rules that define security practices and expectations
  • Governance: Frameworks and processes for managing and enforcing policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Threat Modeling

A

Threat Modeling a systematic approach to identifying and mitigating security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a credentialed and a non-credentialed vulnerability scan?

A
  • Credentialed scan: provides a much deeper insight into system misconfigurations and patch status
  • Non-credentialed scan: limits the amount of detail obtained, but is more realistic from an external attacker’s perspective, as the scanner does not have valid login credentials for the target system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When analyzing data to prioritize vulnerabilities, what factors should an analyst consider?

A

The analyst should consider the data classification of the information on the system, whether the system is internet-exposed, what services it offers, and its role (e.g., production, test, development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of issue might an analyst suspect if a vulnerability scan reports flags an administrator account with a password that never expires?

A

This issue indicates a misconfiguration or a lack of appropriate domain security policies that could affect many other systems on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly