Info Security Exam 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/115

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

116 Terms

1
New cards

IR Team

Incident Response team

Responsible for developing an incident response plan. Utilizes existing plans, policies, and procedures during IR preparation.

2
New cards

Incident Response Plan (IRP)

A set of processes an organization follows to recognize, respond, and recover from an incident.

3
New cards

Containment

An IR Strategy used to prevent an incident from impacting other network resources.

4
New cards

Isolation

An IR Strategy used to limit an incident’s impact to a single network resource.

5
New cards

Segmentation

An IR strategy used to limit an incident’s impact to a small group of network resources.

6
New cards

Incident Recovery

A return to normal operation following an incident’s eradication.

7
New cards

Lessons Learned

Process of reviewing a recent task, incident, or event to identify an opportunity for improvement.

8
New cards

Root Cause Analysis (RCA)

A systematic approach used to determine an incident’s root causes.

9
New cards

Command-line interface (CLI)

A text-based, or command-line interface used to execute commands via a keyboard.

10
New cards

Graphical user Interface (GUI)

A graphical interface used to interact with menus and icons via a pointing device

11
New cards

Network Platform

A proprietary CLI or GUI used to execute a command or access software on a vendor-specific device.

12
New cards

Bandwidth Monitor

Used to measure the amount of data a connection transfers.

13
New cards

Netflow

A Cisco-proprietary protocol system that collects inbound and outbound traffic, or flow, on Cisco devices.

14
New cards

Sampled Flow (sFlow)

Randomly Samples and collects a network’s inbound and outbound traffic.

15
New cards

IP flow information export (IPFIX)

An industry standard for collecting and visualizing IP flow

16
New cards

Protocol Analyzer

A monitor software used to intercept and classify network traffic by protocol.

17
New cards

Metadata

Data describing or identifying other data

18
New cards

Traffic log

A device’s recording of incoming and outgoing network traffic events.

19
New cards

Audit Log

A device’s recording of system-related events such as failed and successful user login attempts

20
New cards

System logging protocol or Syslog

A network protocol enabling a device or application to send log entries to a Syslog server.

21
New cards

Syslog Server

A node configured to receive logs from Syslog-configured devices and appliations.

22
New cards

Emergency (Level 0)

Indicates a system is unusable.

23
New cards

Alert (Level 1)

Indicates an emergency event is likely to occur.

24
New cards

Critical (Level 2)

indicates an alert event is likely to occur

25
New cards

Error (Level 3)

Indicates a non-critical event occurred.

26
New cards

Warning (Level 4)

indicates a error event is likely to occur.

27
New cards

Notification (Level 5)

Indicates a normal event requiring further attention occurred.

28
New cards

Informational (Level 6)

Indicates a normal event NOT requiring further attention occurred.

29
New cards

Debug (Level 7)

Recording a background event that is normally hidden.

30
New cards

Syslogd

A legacy syslog daemon used on older Linux Distributions.

31
New cards

Syslog Next generation (syslog-ng)

A syslog daemon providing advanced features and capabilities.

32
New cards

Rsyslog

A syslog damon used on most modern Linux Distributions

33
New cards

Journalctl Log

A querying service for Linux’s system manager known as systemd.

34
New cards

Dump File

A point-in-time system or application status quickly captured in a text file.

35
New cards

Session initiation Protocol (SIP) log

A log containing events for voice, video, and messaging sessions.

36
New cards

Quarantine

The process of isolating a compromised endpoint or data to prevent further compromise.

37
New cards

Application Approved List

A policy and configuration of a list of allowed applications for an organization.

38
New cards

Application Deny List or Application Blocklist

A policy and a configuration of a list of disallowed application for a organization.

39
New cards

Mobile Device Management (MDM)

Hardware and software resources used to centralize the configuration, monitoring, and management of mobile devices.

40
New cards

Security Orchestration, automation and response (SOAR)

Helps coordinate, execute and automate tasks in a single platform between people and tools.

41
New cards

MITRE Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK)

MITRE corporation’s attack framework that includes a database of attacks and organization can use for IR exercises.

42
New cards

Diamond Model of intrustion Analysis

An Attack framework focused on understanding the relationships among an incident’s core components.

43
New cards

Cyber Kill Chain

An attack framework focused on understanding the steps an attacker must take to be successful.

44
New cards

IR Exercise

The use of an attack framework and an organization’s IRP to evaluate an organization’s IR efforts.

45
New cards

Tabletop Exercise

An IR exercise type where the IR team talks through each IRP step

46
New cards

Walkthrough Exercise

An IR exercise type where the IR team walks through each IRP step without taking action.

47
New cards

Simulation Exercise

An IR exercise type where the IR team executes the IRP on a simulated incident.

48
New cards

Failover

The process of automatically switching to redundant systems or resources to maintain uninterrupted operation in case of a primary system failure.

49
New cards

Parallel Processing

Involves simultaneously using multiple computing resources to perform tasks.

50
New cards

Digital Foresnsics

Focuses on collection, examination, analysis, and reporting on electronically stored and/or processed data.

51
New cards

Digital evidence

Electronic Data of value to an investigation that is stored on, processed, received, or transmitted by an electronic device.

52
New cards

Timestamp

A digital record of the date and time an event occurred.

53
New cards

Time Offset

The time difference between a system’s local time and Greenwich Mean time (GMT)

54
New cards

Chain of Custody

Process of tracking the movement of evidence through the evidence’s collection, preservation, and analysis.

55
New cards

Provenance

A record describing the origin and historical information about a piece of data.

56
New cards

Digital Evidence Acquisition

The process of collecting relevant data to a forensic investigation, while preserving data integrity.

57
New cards

Forensic Artififact

Any data that may potentially be used as digital evidence.

58
New cards

Data Volatility

A measure of how long data is retained on an electronic component in absence of power.

59
New cards

Order of Volatility

The sequence of data acquisition in a forensic investigation based on data volatility.

60
New cards

Right-to-audit

A legal contract that grants one party the right to perform an audit of the records, operations, or processes, of another party.

61
New cards

Data Jurisdiction

The legal and regulatory framework that determines which laws have jurisdiction over data.

62
New cards

Data Breach Notification

The process of informing individuals, organizations, or authorities when a data breach has occurred, possibly exposing sensitive or personal information.

63
New cards

Checksum

A string of letters and numbers derived from a data block for the purpose of detecting accidental errors and intentional modifications of data during the data’s storage or transmission.

64
New cards

File Carving

The process of identifying and recovering files in the absence of filesystem metadata by analyzing file formats in a storage media’s un-allocated space.

65
New cards

File signature or Magic Number

A sequence of bytes at the beginning of a file that uniquely identifies the file type.

66
New cards

E-discovery or Electronic Discovery

The process of identifying, preserving, collecting, and producing electronically stores information (ESI) in legal proceedings or investigations.

67
New cards
68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards