CompTIA Security SY0-601
CompTIA Security SY0-601
SY0-601
What is phishing?
Email for example that tries you to click on the link and reveal sensitive
information.
What is pretexting?
Attacker is a character in a situation they create
Lying to get information
What is pharming?
Can be used in case where DNS server is poisoned.
Everyone is redirected to bogus site.
Pharming harvest large groups of people
What is Vishing?
Voice phishing
Caller spoof ID
What is smishing?
Phishing over SMS to get information or click link
What is malware?
Malicous software that is going to have negative impact on user.
Typer of malware
Viruses
Crypto - malware
Ransomware
Worms
Trojan horses
Rootkit
Keyloggers
Adware
Botnets
How can you block worms?
Firewalls and IDS/IPS can mitigate.
We need signature of that worm to put restriction on firewall between 2 systems.
What is ransomware?
May be a fake ransom to get people to pay
What is crypto-malware?
Malicious software that will encrypt your data and key to unlock it can be
obtained by paying with bitcoin
What is PUP?
Potentially unwanted programs
What is adware?
pop-ups that advertise
Installed accidentally, mayb be included with other software
It's hard to remove them
May cause performence issues
What is spyware?
Malicious software that tries to find personal information about you.
Checks visited sites, records keystrokes
What is C&C?
Command and control server sends instructions to botnets what to perform.
Used for DDoS attacks, relay spam
Persistent stored XSS attack - includes malicious payload (everyone gets the
payload)
DLL - (Windows library containing code and data) runs as part of the target
process - another application will run the program and therefore we will have
information that normally we wouldn't have.
What is shimming?
Allows backwards compatibility with previous version
Filling the space between two objects
What is refactoring?
Metamorphic malware - when malware is dowloaded each time it's unique.
Malware auther will add additional code - loops, pointless code strings to make
that signiture won't match
What is bluejacking?
Sending unsolicited messages to another device via Bluetooth
What is Bluesnarfing
Access a bluetooth-enabled device and transfer data
What is RFID?
Radio frequency identification
It's used for access badges, animal identification, anything that needs to be
tracked
What is NFC?
Near field communication
Used for payment systems
What is nonce?
It is an arbitrary number that is used once in cryptography to add some
randomness
Can be even an malware in your browser that waits fro you to login to your bank
account
Domain reputation
suspicious activity from email does matter - bad reputation can cause email
delivery to fail
SItes that are infected with malware won't be indexed
Visual Basic fo Application (VBA) - macros and automation in Microsoft Office and
can talk directly to operating system
Nation states - have security experts, commonly used for APT - advanced
peristent threat
Script kiddies - Uses a lot of scripts, that he doesn't have the knowledge how
they work and tries to gain access with one of them
Direct access
Wireless attack
Email attack
Supply chain attack
Social media attack
Removable media attack
Cloud attack
What is OSINT?
Open source intelligence - publicly available sources, internet, government data.
What is AIS?
Automated indicator sharing - intelligence shared freely in standart format STIX,
to securely transfer we use TAXI
What is IOC?
Indicator of compromise - to detect that we have been breached
Unusual amount of network activity
Change to file hash values
Irregular international traffic
Changes to DNS data
Ucommon login patterns
Spikes of read requests to certain files
What is CVE?
Common vulnerabilities and exposure database
What is TTP?
Tactics, techniques and procedures - signature marks of the attacker - this might
change based on what he is attacking
Vulnerability types
Zero-day attacks
Open permissions
Unsecured root accounts
Errors
Weak encryption
Insecure protocol
Default settings
Open ports and services
Inproper patch management
Legacy platforms
Types of scans
Non-intrusive scans
Intrusive scans
Non-credentialed scans
Credentialed scan
What is SOAR?
Security orchestration, automation and response
Automate routine, tedious and time intensive activities
What is obfuscation?
Hide some of the original data
What is diffusion?
In crypthography changing one character of the input will result in changing
many characters in the output
What is Honeypots?
Virtual world for attacker to exploit to learn about their techniques.
What is DNS sinkhole?
a DNS that hands out incorrect IP addresses
Attacker can redirect you to incorrect service
We can configure it that if malware infected machine and tries to access specific
site that we redirect it and notify responsible people
What is IaaS?
Infrastructure as a service.
We are provided with hardware - we need to secure the data
What is SaaS?
Software as a service
We need to configure application
Central management of data
Google mail is SaaS
What is PaaS?
Platform as a service
You are given platform to develop your own application
What is MSP?
Managed service provider
Not all cloud service provider are MSPs
MSP support network connectivity management, backups and disaster recovery,
growth management and planning
What is virutalization?
Enables to run many different operating systems on the same hardware
What is FaaS?
Function as a Service
Application are seperated into individual autonomous functions
Infrastructure as code
describes an infrastructure
define servers, network and applications as code
Ability to easily deploy application instances, which have specific and same
setting
What is VM sprawl?
The virtual machines are everywhere as they are not removed. We need a formal
process to deprovision them.
What is VM escape?
We can break out of VM and interact with the host's operating system and move
between others to VM
What is sandboxing?
Isolated testing environment
Quality assurance - verifies features are working as expected, verifies old errors
don't reappear
Staging - Testing application in real like environment. Production data are copied
for example and we test performace
What is scalability?
The ability to increase the workload in a give infrastructure
What is elasticity?
Increase or decrease available resource as the workload changes
What is orchestration?
Automation in cloud computing - will deploy servers, networks, switches,
firewalls = instantly provisioned
What is federation
Provide network access to others
Third-parties can establish a federated network (Facebook, Google, Twitter)
What is attestation
Prove the hardware is really yours - system you can trust
At Verizon laptops
Types of authentication
Something you know - passwords, pin, patter
Something you have - smart card, USB token, hardware or software tokens,
phone
Something you are - biometrics
Somewhere you are - based on location // IP address
Something you can do - handwriting
What is redundancy and how to provide it?
Duplicate parts of the system - if a part fails the redundant part can be used
Types of RAID
RAID 0 - no fault performance
RAID 1 - mirroring - duplicates the data - requires twice the space
RAID 5 - striping with parity = fault tolerant, only requires an additional disk for
redundancy
What is UPS?
Uninterruptible power supply
Short term backup power - we use batteries
What is HVAC?
Heating, Ventilation and Air conditioning system
What is plaintext?
An unecrypted message
What is ciphertext?
an encrypted message
What is cipher?
the alghorithm used to encrypt and/or decrypt ciphertext
What is steganography?
Security through obscurity = message is not visible to human eye but it's visible.
Graphics as photo
Embed messages in TCP packets, invisible watermarks, image, audio, video
What is blockchain?
A distributed ledged - everyone on the blockchain network maintains the ledge
Records and replicates to anyone and everyone
Used in payments, digital identification, supply chain monitoring
Limitations of cryptography
Easily quessed passwords without a salt
Speed - a system needs CPU and power
Size - can potentially increase the storage size
Weak keys - can be bruteforce
Time - large files can take a lot of time - Assymetric is slowerr than symmetric
Key reuse - reusing the same key reduces complexity
Next generation firewall - deep packet inspection - can see what application is
used
What is fuzzing?
Attackeer sends random input to an application to find fault
What is afiinity?
Many applications require coommunication to the same instance
- each user is "stuck" to the same server
- tracked through Ip address or session IDs
nonrepudiation is the ability to verify that a message has been sent and received
so that the sender (or receiver) cannot refute sending (or receiving) the
information.
Stateful firewall - everything within a valid flow is allowed. They will remember
that session was requested before and therefore will allow communication the
other way. It is creating a session table.
What is SAE?
Simultaneous Authentication of equals - we get preshared keys to communicate
without sending it through the network
Derived from Diffie-Helman key exchange
What is WPS?
WiFi protected setup
Allows easy setup of a mobile device (NFC, PIN, push a button on access point )
It's not really secure and better to turn it off as PIN is easily cracked
What is EAP?
Extensible authentication protocol - an authentication framework for WiFi
PEAP is secures and we are using TLS tunnel
What is geolocation?
Precise tracking details - find your phone, you
May be managed by MDM
We can apply geofencing - disable camera, when we are inside the office for
example
What is rooting/jailbreaking?
Gaining access to operating system on mobile phone
We can install apps directly - don't have to go through app store
COPE - Coporate owned, personally enabled - company buys the device and
keeps full control of the device. Information is protected.
CYOD - Choose your own device. Company will purchase for you.
Corporate-owned - The company owns the device and controls the content on
the device. You need another phone for personal use
What is replication?
Copy data from on eplace to another
Disaster recovery, high availability
What is PKI?
Public key infrastructure
Gest account - Usually don't have password, but are very restricted
What is PAP?
a basic authentication method
Weak authentication scheme - no encryption during the exchange
Application would need to provide encryption
What is GDPR?
General data protection regulation - people inside EU can decide where their
data goes
Worms act like a virus but also have the ability to travel without human action.
They do not need help to spread.
What is fileless virus?
piece of malware operates only in memory and never touching the filesystem
What is DLL?
Dynamic-link library is a piece of code that can add functionality to a program
through the inclusion of library routines linked at runtime.
What is refactoring??
Refactoring is the process of restructuring existing computer code without
changing its external behavior.
Difference between Rogue access point and Evil
twin?
A rogue AP is an AP that is usually placed on an internal network either by
accident or for nefarious reasons. It is not administered by the network owner or
administrator. An evil twin is an AP that appears to be legitimate but isn’t and is
often used to eavesdrop on wireless communications.
Second, they are a solid networking source of information that enables one to
get answers to questions that have been vetted by others in similar positions.
What is maneuvering?
Maneuvering is also a defensive tactic used by security professionals to disrupt
or prevent an attacker from moving lateraly as part of the attack chain.
They move deeper to the network in search of sensitive data and other high-
value assets.
When an intrusion detection system (IDS) does not generate an alert from a
malware attack, this is a false negative.
What range is used for CVE?
score ranges from 0 to 10. As it increases, so does the severity of risk from the
vulnerability.
What is footprinting?
Footprinting is the first step in gaining active information on a network during
the reconnaissance process.
Client protection - inspects TLS outgoing connection initated by clients inside the
network.
What is hash?
special mathematical function that performs one-way encryption, which means
that once the algorithm is processed, there is no feasible way to use the
ciphertext to retrieve the plaintext that was used to generate it.
What is NFV?
Network function virtualization - is an architecture that virutalizes network
services, such as routers, firewalls, load balancers.
What is hypervisor?
A hypervisor is the interface between a virtual machine and the host machine
hardware. Hypervisors comprise the layer that enables virtualization.
What are 2 types of hypervisors in
virtualization?
Type 1 = run directly on the hardware - bare metal
What is SDKs?
Software developers use packaged sets of software programs and tools called
SDKs to create apps for specific vender platforms.
What is OWASP?
The Open Web Application Security Project (OWASP) is a nonprofit foundation
dedicated to improving web-based application software security.
What is compiler?
Compilers take computer programs written in one language and convert them to
a set of codes that can run on a specific set of hardware
rather than several large updates, with many integrated and many potentially
cross-purpose update elements, all squeezed into a single big package, a whole
series of smaller single-purpose integrations is run
HOTP passwords can remain valid and active for an unknown time period. TOTP
passwords are considered more secure because they are valid for short amounts
of time and change often.
How push notification works?
Push notification authentication supports user authentication by pushing a
notification directly to an application on the user’s device. The user receives the
alert that an authentication attempt is taking place, and they can approve or
deny the access via the user interface on the application.
What is NAS?
Network attached storage (NAS) is the use of a network connection to attach
external storage to a machine. NAS is a simple extension of data storage to an
external system, and typically these devices do not transfer data fast enough for
regular operations.
What is SCADA?
supervisory control and data acquisition - can control manufacturing plants,
traffic lights, refineries, energy networks, water plants, building automation and
environmental controls, and a host of other systems.
What is EMI?
Electormagnetic interference - disturbance that affects an electrical circuit
What is pulping?
Pulping is a process by which paper fibers are suspended in a liquid and
recombined into new paper.
What is pulverizing?
Pulverizing is a physical process of destruction using excessive physical force to
break an item into unusable pieces. Pulverizers are used on items like hard disk
drives, destroying the platters in a manner that they cannot be reconstructed.
What is degaussing?
magnetic storage devices (that is, magnetic tape and hard drives) can be
destroyed magnetically
What provides encryption?
Confidentiality
What is entropy?
Entropy is an important term in cryptography; it refers to the level of
randomness
What is DNSSEC?
DNSSEC validates DNS data, thus providing integrity, but it does not provide
controls for availability or confidentiality.
What is EDR?
Endpoint detection and response = includes antivirus, anti-malware, software
patching, firewall, and DLP solutions.
Remember that HIDS can only detect malicious activity and send alerts. HIPS, on
the other hand, can detect and prevent attacks.
NSM is not a way to prevent intrusions, but when deployed inside a network, it
can detect where other defenses have failed.
What is PEAP?
Protected Extensible Authentication Protocol - encapsulating it with Transport
Layer Security (TLS)
What is EAP-FAST?
offers a lightweight tunneling protocol to enable authentication
The corresponding weakness is that gaps in cellular service still exist in remote
areas.
Geolocation - track movement and location of the mobile device. Can be used to
assist in the recovery of lost devices.
Difference between tethering and hotspot?
Tethering involves the connection of a device to a mobile device to gain network
connectivity. A hotspot can be tethered if the actual device is mobile, but if the
device is fixed, it is not tethering.
What is authentication?
authentication deals with verifying the identity of a subject
What is ABAC?
Attribute-based access control (ABAC) - form of access control based on
attributes. These attributes can be in a wide variety of forms, such as user
attributes, resource or object attributes, and environmental attributes
Users are not able to change access control and rely on administrators
In systems that employ DACs, the owner of an object can decide which other
subjects can have access to the object and what specific access they can have
What is Nonrepudiation?
Assurance that the sender of information is provided with proof of
delivery and the recipient is provided with proof of the sender's identity, so
neither can later deny having processed the information.
What is certificate revocation list used for?
The certificate revocation list is an essential item to ensure a certificate is still
valid. CAs post CRLs in publicly available directories to permit automated
checking of certificates against the list before certificate use by a client. A user
should never trust a certificate that has not been checked against the
appropriate CRL.
The CA’s revocation service creates a digital signature for the CRL. To validate a
certificate, the user accesses the directory where the CRL is posted, downloads
the list, and verifies the CA’s digital signature to ensure that the proper authority
signed the list and to ensure that the list was not modified in an unauthorized
manner.
This hierarchical model might not be possible when two or more companies need
to communicate with each other
What is CRL?
Certificate revocation list
What is PowerShell?
PowerShell is a powerful command-line scripting interface. PowerShell files use
the .ps1 file extension.
Includes:
• The original filename
• Capture and last edited date and timestamps (with varying precision)
• GPS location coordinates (degrees of latitude and longitude)
• A small thumbnail of the original image
• The author’s name and copyright details
• Compass heading
• Device information, including manufacturer and model
• Capture information, including lens type, focal range, aperture, shutter speed,
and flash settings
What is IPFIX?
primary purpose of IPFIX is to provide a central monitoring station with
information about the state of the network
Order of volatility
Order of how to collect data before it's lost
What is Swap/Pagefile?
The swap or pagefile is a structure on a system’s disk to provide temporary
storage for memory needs that exceed a system’s RAM capacity
What is provenance?
Provenance is a reference to the origin of data. In the case of digital forensics, it
is not enough to present a specific data element as “proof”; one must also show
where it came from.
forensic copy of the data is obtained, a hash is collected as well, to allow for the
verification of integrity.
A SOC Type I report evaluates whether proper controls are in place at a specific
point in time.
A SOC Type II report is done over a period of time to verify operational efficiency
and effectiveness of the controls.
What is EA?
The Enterprise Architecture (EA) is a broad framework describing all aspects
What is CCM?
Cloud Controls Matrix (CCM) is a list of security controls for the cloud, mapped to
leading standards, best practices, and regulations.
What is CIS?
Organizations often refer to Center for Internet Security (CIS) benchmarks to
develop secure configuration postures.
What is DoD DISA STIGs program?
Comprehensive, proscriptive configuration guides for all major operating systems
are available here.
What is AUP?
Acceptable use policy (AUP) outlines what the organization considers to be the
appropriate use of its resources, such as computer systems, e-mail, Internet, and
networks. Organizations should be concerned about any personal use of
organizational assets that does not benefit the company.
What is NDA?
Nondisclosure agreements are legally binding documents. Signed NDAs are often
required by employers during the onboarding process to ensure employees are
aware of privacy and confidentiality concerning company data.
What is gamification?
Gamification is the use of games to facilitate user training.
What is MOU?
A memorandum of understanding (MOU) and memorandum of agreement (MOA)
are legal documents used to describe a bilateral agreement between parties to
some common pursuit or goal.
What is BPA?
A business partnership agreement (BPA) is a legal agreement between partners
that establishes the terms, conditions, and expectations of the relationship
between the partners.
These details can cover a wide range of issues, including typical items such as
the sharing of profits and losses, the responsibilities of each partner, the addition
or removal of partners, and any other issues
Cloud computing, contracts and legal agreements will denote which parties are
assuming which risks.
Use the numbers 1 to 5 for each of the axes, and this yields risk values from 1 to
25.
What is Risk Control Assessment?
A risk control assessment is a tool used by the Financial Industry Regulatory
Authority (FINRA) to assess a series of risks associated with their member
institutions
What is SLE?
Single-Loss Expectancy (SLE)
SLE = asset value (AV) × exposure factor (EF)
For example, to calculate the exposure factor, assume the asset value of a small
office building and its contents is $2 million. Also assume that this building
houses the call center for a business, and the complete loss of the center would
take away about half of the capability of the company.
What is ALE?
Annualized Loss Expectancy annual loss expectancy (ALE) is calculated by
multiplying the SLE by the likelihood or number of times the event is expected to
occur in a year, which is called the annualized rate of occurrence (ARO):
What is ARO?
The annualized rate of occurrence (ARO) is a representation of the frequency of
the event, measured in a standard year. If the event is expected to occur once in
20 years, then the ARO is 1/20.
The ALE determines a threshold for evaluating the cost/benefit ratio of a given
countermeasure. Therefore, a countermeasure to protect this business
adequately should cost no more than the calculated ALE
What is RTO?
The term recovery time objective (RTO) is used to describe the target time that is
set for the resumption of operations after an incident.
Shorter RTO results in higher costs because it requires greater coordination and
resources.
What is RPO?
Recovery point objective (RPO) is the time period representing the maximum
period of acceptable data loss.
Assuming a system has an MTBF of 6 months and the repair takes 30 minutes,
the availability would be the following:
The time between failures is measured from the time a system returns to service
until the next failure. The MTBF is an arithmetic mean of a set of system failures:
What is PII?
Personally identifiable information
What is PHI?
Protected health information
Separating the PII elements such as names, Social Security numbers, and
addresses from the remaining data through a data anonymization process
retains the usefulness of the data but keeps the connection to the source
anonymous.
What is privacy?
One’s ability to control information about oneself
What is swapfile?
A swapfile is a location on a hard disk drive used as the virtual memory
extension of computer's RAM
What is VIP?
Virtual IP
What is CASB?
Cloud application security broker
What is pivoting?
Pivoting involves the rescanning of network connections to find unknown or
previously unseen connections.
How does a hypervisor enable multiple guest
operating systems to run concurrently on a
host computer?
By abstracting the hardware from the guest operating system
What is confidentiality?
Information has not been disclosed to unauthorized people
What is integrity?
Information has not been modified or altered without proper
authorization
What can be physical control?
Alarm systems, locks, surveillance cameras, identification cards, and
security guards
Metamorphic
• Virus that is able to rewrite itself entirely before it attempts to infect
a file (advanced version of polymorphic virus)
What is dropper?
Malware designed to install or run other types of malware embedded in a
payload
on an infected host
What is downloader?
A piece of code that connects to the Internet to retrieve additional tools after the
What is TPM?
Trusted Platform Module (TPM)
Chip residing on the motherboard that contains an encryption key
If your motherboard doesn’t have TPM, you can use an external
USB drive as a key
What is HSM?
Hardware Security Module (HSM)
Physical devices that act as a secure cryptoprocessor during the encryption
process
What is UEBA?
User and Entity Behavior Analytics (UEBA)
What is ROT?
Hardware Root of Trust (ROT)
What is UEM?
(unified endpoint management) solutions can address a wider range of devices
What is IdP?
Identity provider
Since open Wi-Fi hotspots do not have a way to prove they are legitimate, they
can be easily spoofed. Attackers can stand up a fake version of the hotspot and
then conduct an SSL stripping attack by inserting themselves into sessions that
victims attempt to open to secure servers.
Mary has discovered that a web application
used by her company does not always handle
multithreading properly, particularly when
multiple threads access the same variable. This
could allow an attacker who discovered this
vulnerability to exploit it and crash the server.
What type of error has Mary discovered?
race condition
What is consensus?
Consensus, sometimes called social proof, is a social engineering principle that
leverages the fact that people are often willing to trust groups of other people.
Acme Company is using smartcards that use
near-field communication (NFC) rather than
needing to be swiped. This is meant to make
physical access to secure areas more secure.
What vulnerability might this also create?
Eavesdropping
Repurposed desktop PC - introduces all the potential issues that a PC can include
such as a vulnerable operating system or software.
SAML
OpenID
What is FDE?
full disk encryption
What is the easiest deployement of VPN?
SSL/TLS VPN
Virtual and cloud firewalls are most often deployed in datacenters where virtual
or cloud environments are in use, although a virtual firewall could be run on an
endpoint.
What is NSA?
National security agency - provides configuration benchamarks
Elle wants to acquire the live memory (RAM)
from a machine that is currently turned on.
Which of the following tools is best suited to
acquiring the contents of the system’s
memory?
Volatility framework
A TPM (Trusted Platform Module) is a device used to store keys for a system but
does not offload cryptoprocessing, and it is used for keys on a specific system
rather than broader uses.
Top Secret information requires the highest degree of protection and would
cause exceptionally grave harm if exposed without authorization.
What is APT?
Advanced persistent threat
What is prepending?
Adding an expression or phrase to an email, subject line, or headers to either
protect or fool users.
can be used when adding data as part of an attack, and that social engineers
may “prepend” information by inserting it into conversation to get targets to
think about things the attacker wants them to.
What type of attack depends on the attacker
entering JavaScript into a text area that is
intended for users to enter text that will be
viewed by other users?
Cross-site scripting involves entering a script into text areas that other users will
view.
What is PGP?
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic
privacy and authentication for data communication.
What is HIPPA?
The Health Insurance Portability and Accountability Act (HIPPA) is a United States
federal law designed to provide privacy standards to protect patients' medical
records and other health information provided to health plans, doctors, hospitals,
and other health care providers
What is COPPA?
The Children's Online Privacy Protection Act (COPPA) is a United States federal
law that imposes certain requirements on operators of websites or online
services directed to children under 13 years of age and on operators of other
websites or online services that have actual knowledge that they are collecting
personal information online from a child under 13 years of age.
What is SCCM?
The Microsoft System Center Configuration Manager (SCCM) provides remote
control, patch management, software distribution, operating system deployment,
network access protection, and hardware and software inventory.
What is VDI?
Virtual desktop infrastructure (VDI) - we can manage patches, configurations and
software installation from central location.
What is hardening?
Hardening is the process of improving the security of an operating system or
application. One of the primary methods of hardening a trusted OS is to
eliminate unneeded protocols. This is also known as creating a secure baseline
that allows the OS to run safely and securely
What is ECC?
Elliptic curve cryptography
Assymetric algorithms
Diffie-Hellman, RSA, DSA, PGP and ECC
What is GLBA?
Gramm-Leach-Bliley Act (GLBA) institutes requirements that help protect the
privacy of an individual's financial information held by financial institutions and
others, such as tax preparation companies.
What is SOX?
Sarbanes-Oxley Act (SOX) dictates requirements for storing and retaining
documents relating to an organization's financial and business operations,
including the type of documents to be stored and their retention periods. It is
relevant for any publicly-traded company with a market value of at least $75
million.
What is FERPA?
The Family Educational Rights and Privacy Act (FERPA) requires that educational
institutions implement security and privacy controls for student educational
records.
What is SPI?
information about an individual's race or ethnic origin is classified as Sensitive
Personal Information (SPI).
What is FM-200?
Fire extinguishing system
What is BAS?
A building automation system (BAS) for offices and data centers ("smart
buildings") can include physical access control systems, but also heating,
ventilation, and air conditioning (HVAC), fire control, power and lighting, and
elevators and escalators
penetration testing
What is GPO?
Microsoft's Group Policy Object (GPO) is a collection of Group Policy settings that
defines what a system will look like and how it will behave for a defined group of
users. It allows an administrator to create a policy and deploy it across many
devices in the domain or network. P
What program is used for forensic analysis on
imaged drive?
Autopsy
What is NGSWG?
Next-generation secure web gateways (NGSWGs) combine many web-based
security functions like data loss prevention (DLP), content decryption and
inspection, cloud access security broker (CASB), threat detection, and web
content filtering into a single solution.
What is ISA?
The interconnection security agreement (ISA) governs the relationship between
any federal agency and a third party interconnecting their systems.
Difference between RTO and MTTR?
Mean time to repair (MTTR) is a measure of the time taken to correct a fault to
restore the system to full operation. MTTR is often used to describe the average
time to replace or recover a system or product.
What is DaaS?
Desktop as a Service (DaaS) provides a full virtualized desktop environment from
within a cloud-based service. This is also known as VDI (Virtualized Desktop
Infrastructure) and is coming in large enterprise businesses focused on
increasing their security and minimizing their operational expenses.
ABAC provides the most detailed explicit type of access control over a resource
What can be used if client supports WPA with
pre-shared keys and back end has radius?
802.1x using EAP with MSCHAPv2
syslog port
514
iCSI
TCP 860
Link data storage facilities over IP
FTPS port
989 990
port for IMAP with SSL
993
L2TP port
1701
PPTP port
1723
FCIP port?
Fiber channel over IP
3225
FTP port
20 21
SCP port
22
SFTP port
22
TFTP port
69
MySQL port
3306