SecurityPlus_4.1-4.3_Flashcards

(63 cards)

1
Q

Front

A

Back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a secure baseline?

A

A defined, known-good configuration of an application or system that ensures consistent security across all instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why must all application instances follow the secure baseline?

A

To maintain consistent security settings like firewall rules, patch levels, and OS versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are integrity measurements?

A

Checks performed to verify that a system matches the secure baseline; deviations must be corrected immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are integrity measurements important?

A

They help detect unauthorized or accidental changes from the secure baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of establishing baselines?

A

To create foundational security policies that define the expected secure state of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where can you find security baselines?

A

From manufacturers like OS vendors, application developers, or appliance makers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many group policy settings are in Windows 10?

A

Over 3,000, but only some are security-related.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are baselines deployed in large environments?

A

Through centralized management tools like Active Directory Group Policy or Mobile Device Management (MDM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is automation key in baseline deployment?

A

It allows consistent deployment to hundreds or thousands of devices efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do baselines need maintenance?

A

Because new vulnerabilities, updates, or software changes may require updates to the baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What must be tested when maintaining baselines?

A

Potential conflicts between different baselines or policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is system hardening?

A

The process of securing a system by reducing vulnerabilities through configuration and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are hardening guides important?

A

They provide vendor-specific or community-recommended security configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are updates critical for mobile devices?

A

They fix bugs and patch known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can segmentation protect mobile data?

A

By separating company and user data, often via MDM policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should be removed during workstation hardening?

A

Unnecessary software to reduce the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tool helps manage workstation policies in Windows?

A

Active Directory Group Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why must you change default credentials on network devices?

A

Default logins are easily exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How often should network device firmware be updated?

A

Infrequently, but updates are critical when released.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the ‘keys to the kingdom’ in cloud environments?

A

The cloud management workstation, which must be highly secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What principle should apply to cloud permissions?

A

Least privilege—only grant access needed for a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What should be enforced on server user accounts?

A

Minimum password lengths, complexity, and account limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How should network access be controlled on servers?

A

Limit access and monitor for unauthorized connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why must SCADA systems be segmented?
They control critical industrial systems and must be isolated from external networks.
26
What type of system manages SCADA operations?
A PC or controller that manages distributed industrial devices.
27
Why are embedded systems difficult to secure?
They often can’t be easily upgraded or patched.
28
How can embedded systems be protected?
By applying segmentation and firewall rules to restrict access.
29
What makes RTOS different from regular OSes?
It processes tasks in a strict, deterministic schedule for time-critical systems.
30
How should RTOS systems be secured?
Run minimal services, isolate systems, and use host-based firewalls.
31
Why are IoT devices often insecure?
Manufacturers use weak defaults and lack security expertise.
32
How should IoT devices be isolated?
Place them on a separate VLAN to limit access.
33
What is the goal of wireless security?
To ensure authentication, confidentiality, and integrity of all wireless communications.
34
What does WPA3 improve over WPA2?
It adds stronger encryption (GCMP) and replaces PSK handshakes with SAE for better security.
35
What is SAE in WPA3?
Simultaneous Authentication of Equals—a mutual authentication process that prevents brute force attacks.
36
What is 802.1X used for?
Port-based Network Access Control that prevents access until authentication succeeds.
37
What is the AAA framework?
Identification, Authentication, Authorization, and Accounting—core network access control concepts.
38
What is RADIUS?
A centralized AAA protocol used for authentication of users and devices on networks.
39
What is EAP?
Extensible Authentication Protocol—a framework for many authentication methods over 802.1X.
40
What is input validation?
Checking all input to ensure it matches expected formats, preventing injection attacks.
41
What are secure cookies?
Cookies with the 'Secure' attribute set, only sent over HTTPS connections.
42
What is static code analysis?
Reviewing code for vulnerabilities without executing it (Static Application Security Testing).
43
What is code signing?
Digitally signing software to verify authenticity and integrity of code.
44
What is sandboxing?
Running applications in isolated environments to prevent system-wide impact.
45
Why is asset tracking important?
To associate ownership, classification, and maintenance records with each device.
46
What is media sanitization?
The process of securely erasing or destroying data so it cannot be recovered.
47
What is a certificate of destruction?
Proof from a third party that data or media was securely destroyed.
48
Why is data retention necessary?
To meet compliance, operational, and recovery requirements.
49
How does vulnerability scanning differ from penetration testing?
Scanning is non-invasive; penetration testing actively exploits vulnerabilities.
50
What is fuzzing?
Sending random input to an application to detect crashes or unexpected behavior.
51
What is package monitoring?
Verifying software packages for integrity and authenticity before deployment.
52
What is OSINT?
Open-Source Intelligence—publicly available data used for security research.
53
What is proprietary threat intelligence?
Purchased data from vendors providing curated threat analytics and indicators.
54
What is dark web intelligence?
Monitoring hidden forums and marketplaces for stolen data or company mentions.
55
What document defines pentest parameters?
Rules of engagement, outlining scope, contacts, and limitations.
56
What is persistence in penetration testing?
Setting up a way to regain access, like backdoors or accounts, after compromise.
57
What is a pivot?
Using a compromised system as a relay to access other systems.
58
What is responsible disclosure?
Reporting vulnerabilities privately to allow the vendor time to fix before public release.
59
What is a false positive?
When a scan reports a vulnerability that does not actually exist.
60
What is CVSS?
Common Vulnerability Scoring System—a 0–10 rating for vulnerability severity.
61
What is a CVE?
Common Vulnerabilities and Exposures—a unique identifier for known security flaws.
62
What is exposure factor?
A percentage indicating the potential impact if a vulnerability is exploited.
63
What does risk tolerance determine?
How much risk an organization is willing to accept before acting on a vulnerability.