1.0 - Essential Security Principles Flashcards

(15 cards)

1
Q

What are the three main principles of authorization?

A

1) least-privilege
2) need-to-know
3) implicit-deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SIEM?

A

Security Information and Event Management - part of accounting - collects logs, detects incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SOAR?

A

Security Orchestration, Automation, and Response - part of accounting - automates responses to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cisco ISE?

A

Identity Services Engine - a Cisco server that runs RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the “old” and “new” RADIUS ports?

A

old = UDP 1645-6
new = UDP 1812-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If I encrypt a message using the receiver’s public key, and the receiver decrypts it using their private key, which CIA goal have we achieved?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If I encrypt a message with a private key, and the recipient decrypts it with a public key, which goal have we achieved?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What asymmetric encryption method results in both confidentiality and authentication at the same time?

A

Encrypting a message with the recipient’s public key, then encrypting it again with the sender’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is faster, symmetric or asymmetric ciphers?

A

symmetric, which is therefore less resource-intensive when sending large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES is (symmetric/asymmetric)

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RSA, DSA, DH, and ECC are all ______

A

asymmetric algorithms:

RSA - authentication
DSA - generate digital signatures
DH - key exchange
ECC - cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SCEP?

A

Simple Certificate Enrollment Protocol, which is a way to automate requesting and installing root and identity certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is OCSP?

A

Online Certificate Status Protocol, a way to verify the validity of a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a CRL?

A

Certificate Revocation List, a list of revoked certs from a CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three commonly-used SHA hashing algorithms?

A

256, 384, and 512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly