Sec+ - Study #3 Flashcards

(34 cards)

1
Q

is a technique used to hide real data by replacing it with fake but realistic data. This allows organizations to use the data for testing, training, or analysis without exposing sensitive information.

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a cybersecurity solution that monitors computers, laptops, and other endpoints for suspicious activity. It detects, investigates, and responds to threats in real time—helping security teams stop attacks like malware or ransomware before they spread.

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a data protection method that replaces sensitive information—like credit card numbers or Social Security numbers—with a random string of characters

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves delegating responsibility for specific tasks or projects, ensuring there is a clear point of accountability for planning, execution, and follow-up

A

Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

primarily addresses the prevention of email spoofing by allowing the receiving email server to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain

A

DKIM (DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ensure continuous operation by having backup components ready to take over in case of a failure, unlike single points of failure which can lead to complete system shutdowns

A

Redundant systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During a vulnerability scan, what activity is MOST critical to ensuring the effectiveness of the scan?

A

Selecting the correct scan type and depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Implementing firewalls primarily serves as a __ control. This is because firewalls are hardware or software-based systems designed to filter incoming and outgoing network traffic based on a set of security rules

A

technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __ in change management is when proposed changes are tried out in a controlled environment to verify that they work correctly, don’t introduce new problems, and meet performance and security requirements before being fully deployed.

A

Test Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of identity and access management, which of the following best ensures that users have access only to the resources they’ve been explicitly granted?

A

RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the best technique for securing customer payment information within databases, as it replaces sensitive data elements with non-sensitive equivalents, which can be safely stored and processed without exposing the original data

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the practice of hiding information inside something else—like embedding a secret message within an image, audio file, or text

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Signs of __ include unusual network traffic, system slowdowns, unexpected crashes, unauthorized file changes, or programs running without user initiation.

A

malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The attacker sends requests to third-party servers using the victim’s IP as the source. Those servers then send responses to the victim, amplifying the traffic and hiding the attacker’s identity.

A

Reflected DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which agreement type is best suited for establishing the general terms and conditions between an organization and its vendors, which will govern future transactions and services?

A

The Master Service Agreement (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blocking websites with low reputation scores is an effective way to protect against __ , as these sites are often newly created or known to host malicious content

A

phishing attacks

17
Q

The ___ feature of Public Key Infrastructure (PKI) is utilized to ensure that only the intended recipients can read the content of emails

18
Q

How does the CVE aid in vulnerability management?

A

By offering a unique identifier for publicly known vulnerabilities.

19
Q

a hardware-based security chip built into many modern laptops and desktops. It securely stores cryptographic keys, passwords, and certificates, and it’s commonly used for:

20
Q

The technology that offers robust key storage and cryptographic operations for cloud applications

A

Hardware Security Module (HSM)

21
Q

are security measures designed to protect the physical environment—the buildings, equipment, and personnel—from unauthorized access or damage.

A

Physical controls

22
Q

use hardware, software, or firmware to enforce security policies and protect information systems.

A

Technical controls

23
Q

is a type of malicious software designed to hide its presence and give an attacker unauthorized, privileged access to a computer or network.

24
Q

a type of malicious software that disguises itself as a legitimate program to trick users into installing or running it.

25
Involve processes, procedures, and human actions that help manage and enforce security.
Operational control
26
are notifications generated by security systems (like an Intrusion Detection System – IDS, or Intrusion Prevention System – IPS) when network traffic or system activity matches a known pattern of malicious behavior.
Signature-based alerts
27
is a network architecture approach that separates the network control plane from the data plane, allowing centralized management of network traffic through software.
Software-Defined Networking (SDN)
28
a logical segmentation of a physical network that groups devices into separate broadcast domains, even if they are connected to the same physical switch. Ex. A company has one physical office network but wants to separate departments for security and traffic management.
VLAN
29
a software-defined approach to managing wide area networks. It uses centralized control software to securely and intelligently route traffic across multiple types of connections (like MPLS, broadband, LTE) based on business policies, application needs, and network conditions. Ex. ___ automatically routes video calls over the fastest connection and backup data over cheaper links. If one link fails, ___ switches traffic to another connection without interruption.
SD-WAN
30
protocol that secures IP traffic by encrypting and authenticating it, often used for VPNs. Ex. A company wants to connect its headquarters network to a branch office network over the public Internet securely. ___ creates a VPN tunnel between the two offices. All data sent between HQ and the branch is encrypted and authenticated
IPsec
31
is a file-level encryption feature in Windows that allows users to encrypt individual files and folders on a disk so that only authorized users can access them. company employee stores confidential reports on their laptop. Using __, the reports are encrypted.
EFS (Encrypting File System)
32
a malicious piece of code that executes when specific conditions are met, such as a particular date, time, or action by the user. Unlike viruses or worms, it does not spread by itself. Ex. A disgruntled employee writes a program that deletes the company’s database if they are terminated. The code remains dormant until the trigger condition (employee termination) occurs.
Logic Bomb
33
a flaw in a system or application that occurs when two or more processes access shared resources at the same time, and the system’s outcome depends on the sequence or timing of execution. Ex. An online banking application allows two simultaneous withdrawals from the same account. If both transactions happen at nearly the same time, the account could be overdrawn due to a __
Race Condition
34