Practice Test 1 Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Buffer Overflow

When an attacker sends more data to memory storage than it can handle, causing the program to overwrite adjacent memory.

2
New cards

Microservice Outages

Occurs when one independent component of a larger system fails.

3
New cards

Risk Register

A centralized document that lists all identified risks to an organization.

4
New cards

Risk Reporting

The process of communicating risk to stakeholders.

5
New cards

Replay Attack

When an attacker captures valid data transmissions (like session tokens) and resends them later, in hopes to tricking the system to grant them unauthorized access.

6
New cards

DDos (Distributed denial of service)

Flooding a service so that its so overwhelmed, real users can’t access it.

7
New cards

Incident Response Process (6 phases)

  1. Preparation

  2. Detection and Analysis

  3. Containment

  4. Eradication

  5. Recovery

  6. Lessons Learned

8
New cards

Lessons Learned

The post incident review that documents the incident, timeline, and improvements that can be made.

9
New cards

Race Condition

It’s a flaw when an attacker can sneakily get in and change the outcome because of timing. Think about the bank example and withdrawing/depositing money.

10
New cards

Capacity Planning

The process of forecasting and preparing for future resource needs

11
New cards

Honeynet

A system intentionally designed to look vulnerable to lure attackers and study their behavior

12
New cards

SCADA System (Supervisory Control and Data Acquisiton)

They are used to monitor and control physical infrastructure like power plants, pipelines, etc.

13
New cards

Hardening

Is a process of securing a system by reducing its attack surface.

14
New cards

Spraying

Brute force attack but the attacker tries common passwords across many accounts, instead of trying just one account.

15
New cards

Downgrade

An attack that forces a system to use an older, weaker version to exploit vulnerabilities.

16
New cards

Sideloading

Installing apps that are outside the official app store.

17
New cards

VLAN (Virtual Local Area Network)

Segments a physical network into separate logical networks

18
New cards

Compensating

A backup or alternative security measure

19
New cards

Directive Control Type

Guide or influence behavior through policies

20
New cards

Secure Enclave

A protected area of memory that isolates sensitive data and code execution

21
New cards

Shadow It

Refers to unauthorized hardware, software, used by employees who go around/over the IT department.

22
New cards

Cross-Site Scripting Attack

A code injection attack where an attacker injects malicious code into a trusted website, which is then executed in a victim’s browser.

23
New cards

Federation

A trust relationship between 2 or more orgs, that allows authentication across systems using a single identity.

24
New cards

Enumeration

Apart of the reconnaissance phase and its where you’re actively gathering information like usernames, system details etc. about a target system.

25
New cards

Key Stretching

A technique used to make passwords stronger by increasing the time it takes to brute-force them. Applying hashing millions of times.

26
New cards

Steganography

The practice of hiding data within other data.

27
New cards

SCAP (Security Control Automation Protocol)

A framework that defines a set of standards and automates security configuration management.

28
New cards

Keylogger

A type of spyware that records keystrokes on a keyboard to capture sensitive information.

29
New cards

RADIUS

Is a centralized protocol used to authenticate, authorize, and account for users connecting to a network.

30
New cards

RTOS

Real Time Operating System