What is network segmentation?
Dividing up a network to control access between the portions (segments).
Which systems are the focus of a business continuity plan?
Critical systems
Which form of authentication can include something you know, something you have, something you are, or somewhere you are?
2FA/MFA
Which encryption method is faster?
Symmetric
MDM
Mobile Device Management
What is the term for an older piece of hardware or software with outdated security features?
Legacy system/software
Briefly explain load balancing
Distribute a workload across multiple devices or systems
Which type of authentication factor is a one-time code?
Something you have
What type of risk analysis is based on expert judgment and intuition?
Qualitative
RBAC
Role-based access control
Which software classification does not require installation on user devices?
Agentless
What is the term for using various systems or technologies to mitigate risk?
Platform diversity
Account lockout, Concurrent sessions, Blocked content, Impossible travel, Resource consumption or inaccessibility, Out of cycle logging, Missing logs
What are the four techniques to address risk?
Accept, Avoid, Mitigate, Transfer
DAILY DOUBLE
HIPS
Which account should you disable immediately after installing a new OS to harden the OS?
The guest account
DAILY DOUBLE
What is it called when an IDS watches for threats that match a known identity?
Signature based detection
Who is responsible for approving or denying change requests?
The Change Control Board or the Project Sponsor
SOAR
Security Orchestration, Automation, and Response
Which type of attack runs code within another process by making it load a dynamic link library?
DLL injection
What is the term for applying a one-way mathematical function to data?
Hashing
What is the process for responding to a security incident?
(1. Process)
2. Detect and Analyze
3. Contain
4. Eradicate
5. Recover
(6. Review Incident/Lessons Learned)
Which plan describes the actions to be taken if an attack occurs against the company's IT systems?
Incident Response Plan or Security Incident Response Plan
API
Application Programming Interface