Vocabulary
Technology & Networks
NIST
Grab Bag
Threat & Incident Management
100

True/False 

A virtual container runs on top of the host operating system kernel and provides an isolated execution environment for applications. 


True

pp. 374

100

A ________ is a private network that is configured within a public network in order to take advantage of the economies of scale and management facilities of large networks. 

VPN 

pg. 417

100

The capability of an organization to continue delivering products or services at acceptable predefined levels following a disruptive incident, is known as what? 

Business continuity 

pg. 625

100

Application whitelisting helps prevent intrusion of unknown _______. 

Software 

pg. 495 

100

This occurs after the detection of a security event, seeks to minimize the damage of the event and facilitate rapid recovery.

Incident Response 

200

A company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. 

Managed Service Provider (MSP) 

pp. 379 

200

Which hypervisor performs better? Type 1 or 2? 

Type 1 

A type 1 hypervisor doesn't compete for resources with an operating system. pp.373 

200

Describes who you are in the digital world. 

Digital identity 

(AC control family)

200

A program that may be unwanted, despite the possibility that users consented to download it. ______s include spyware, adware, and dialers and are often downloaded in conjunction with programs that users actually want. 

Potentially Unwanted Program (PUP) 

200

Name one of the categories of threat sources. 

Adversarial, accidental, structural, environmental. 

pg. 564

300

A _______ ________ _______ consists of incremental hardware and software additions implemented among existing network components. 

Network management system 

pp.399 

300

A ______ is a dedicated network that provides access to various types of storage devices, including tape libraries, optical juke-boxes, and disk arrays. 

Storage Area Network (SAN) 

pp. 377

300

This document is a predetermined set of instructions or procedures that describe how an organization's mission/business processes will be sustained during and after a significant disruption. 

Business Continuity Plan (BCP) 

pg. 625

300

Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality. 

Backdoor/trapdoor 

pg. 488

300

Name (2) types of accidental threats.

User error, mishandling, user error, loss of information systems, undesirable effects of change, resource depletion, misconfig, maintenance error, software malfunction, accidental physical damage. 

400

This type of cloud deployment model is shared by several organizations and supports a specific community with shared concerns. 

Community cloud 

pg. 468

400

A __________ acts as a relay of application-level traffic. 

Application-level gateway/application proxy 

pp. 413 

400

This NIST control family addresses the policies and procedures to protect physical facilities. 

Physical and Environmental Protection (PE) 

400

Enables a user to access all network resources after a single authentication. 

Single Sign On (SSO) 

pg. 497

400

An application or set of tools that provides the ability to gather security data from information system components and present that data as actionable information via a single interface. 

Security Information and Event Management (SIEM) 

pg. 569

500

A software tool that captures keystrokes on a compromised system. 

Keylogger 

pg. 488 

500

Access points that users install without coordinating with IT. 

Rogue access point 

pg. 427

500

This NIST control family focuses on measures to protect against unauthorized access to information systems. 

Access Control (AC) 

500

______ detection involves searching for activity that is different from the normal behavior of system entities and system resources. 

Anomaly

pg. 504

500

A document outlining how an organization will respond to and recover from a cybersecurity incident.

Incident Response Plan (IRP) 

600

A perimeter network segment that is physically or logically between internal and external networks. 

Demilitarized zone (DMZ) 

pg. 508 

600

NIST 800-41 offers a five-phase firewall planning and implementation guide. Plan, configure, _______, deploy, and manage. 

Test

pg. 429 

600

What does the model IAAA stand for? 

Identification, Authentication, Authorization, Accountability 

600

An intruder transmits packets from the outside with a source IP address field containing an address of an internal host. The attacker hopes that the use of a spoofed address allows penetration of systems that employ simple source address security, in which packets from specified trusted internal hosts are accepted. 

IP address spoofing 

pp. 411

600

The first step in incident response. 

Preparation 

700

A malware program that includes a backdoor for administrative control over the target computer. ____s are usually downloaded invisibly with user-requested programs - such as games - or sent as email attachments. 

Remote Access Trojan (RAT) 

pg. 489

700

________ works by encoding voice information into a digital format, which is carried across IP networks in discrete packets. 

VoIP - Voice over IP 

pg. 438

700

THe use of two or more factors to verify an identity. 

Multi-factor Authentication (MFA) 

(IA Family) 

700

This tool blocks communication with known or suspected hostile sources and also blocks suspicious activity or packet content. 

Firewall 

pg. 575

700

The process of identifying and verifying an event. 

Detection and analysis 

800

Data transmitted over enterprise networks and between the enterprise networks and external network links. 

Data in motion 

pg. 511

800

A ______-based IDS detects both external and internal intrusions. 

Host-based IDS 

pg. 505 

800

This control family ensures that third-party vendors comply with security and privacy requirements. 

Supply Chain Risk Management (SR) 

800

True/False 

Non-malware attacks are considered more threatening than malware-based attacks. 

True

pg. 577

800

During this phase of the cyber attack kill chain, the attacker sends a malicious payload to the victim by one of many intrusion methods.

Delivery phase 

pg. 572 

900

An algorithm that maps data to a unique value to verify integrity. It’s a one-way function, meaning that it is practically impossible to reverse the process and determine the original input from the hash value output.

Cryptographic hash

900

In this deployment approach for Identity and Access Management (IAM), each organization subscribes to a common set of policies, standards, and procedures for the provisioning and management of users. Alternatively, the organization can buy a service from a supplier. 

Federated 

pg. 496

900

This control family requires testing and evaluation of information systems during development to ensure thy meet security requirements. 

System and Services Acquisition (SA) 

900

This tool monitors, filters, or blocks data packets as they travel to and from a web application. 

Web application firewall (WAF) 

pg. 574

900

The key to preventing the delivery phase of the cyber attack kill chain is to what? 

Maintain a robust security training and awareness program so that social engineering efforts are more likely to fail. 

pg. 573

M
e
n
u