4.0 Security Operations Flashcards
(37 cards)
Q: What is MDM (Mobile Device Management)?
A: Software that manages and secures mobile devices used in an organization.
Q: What should you always do with default credentials?
A: Change them immediately — they are a major security risk.
Q: What is WPA2 vulnerable to?
A: PSK brute force via the 4-way handshake.
Q: What is WPA3 with GCMP?
A: Uses AES and GCMP for stronger encryption and MIC for integrity.
Q: What is SAE (Simultaneous Authentication of Equals)?
A: A Diffie-Hellman-based key exchange used in WPA3, replacing the 4-way handshake.
Q: What is the Dragonfly Handshake?
A: WPA3’s mutual authentication method using SAE — no pre-shared hash sent.
Q: What is the AAA framework?
A: Authentication, Authorization, and Accounting — tracks user identity and actions.
Q: What are secure cookies?
A: Cookies sent over HTTPS that are marked as secure and HttpOnly.
Q: What is SAST (Static Application Security Testing)?
A: Analyzes source code for security flaws without running it.
Q: What is fuzzing?
A: Sending random inputs to an app to find crashes or unexpected behavior.
Q: What is code signing?
A: Using digital signatures to verify code integrity and authenticity.
Q: What is degaussing?
A: Using a magnetic field to wipe data from storage media.
Q: What is media sanitization?
A: Removing sensitive data before reuse or disposal.
Q: What is CVE?
A: Common Vulnerabilities and Exposures — catalog of known security flaws.
Q: What is SIEM?
A: Security Information and Event Management — collects, analyzes, and alerts on security logs.
Q: What is SCAP?
A: Security Content Automation Protocol — standardizes security tool output and benchmarks.
Q: What is SNMP?
A: Simple Network Management Protocol — gathers network stats via polling or traps.
Q: What is NetFlow?
A: A protocol for collecting IP traffic data across a network.
Q: What is Active Directory?
A: A Microsoft service for managing users, groups, and devices in a network.
Q: What is SELinux?
A: Security-enhanced Linux — uses Mandatory Access Control (MAC) for stricter permissions.
Q: What are examples of insecure vs secure protocols?
Telnet → SSH
HTTP → HTTPS
FTP → SFTP
IMAP → IMAPS
Q: What is SPF (Sender Policy Framework)?
A: Email authentication method that specifies allowed sending mail servers.
Q: What is DKIM (DomainKeys Identified Mail)?
A: Uses digital signatures to validate email content integrity.
Q: What is DMARC?
A: Defines how to handle emails failing SPF or DKIM checks.