4.1 – Common Security Concepts Flashcards

1
Q

What is the CIA triad?

A

Confidentiality, integrity, and availability. Which are the elements of the information system that each organization is trying to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is confidentiality

A

certain info should be known to certain people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is integrity

A

data is being stored and transferred as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is availability

A

data is available to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vulnerability?

A

A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Threat?

A

The potential for someone or something to exploit a vulnerability and breach security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RBAC

A

role based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define 802.1X

A

The IEEE standard that defines port-based security for wireless network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a trap to attract bad guys
usually virtual
used to research what hackers are attacking

A

Honey pot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

common AAA protocol
many devices
remote vpn
available on most OS

A

remote authentication dial in user service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

remote authentication protocol
created to control access to dialup lines

A

TACACS terminal access controller access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

organized set or records
protocol for reading and writing directories over an ip

A

LDAP light weight directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

authenticate once and trusted
no need to re authenticate
mutual authentication

A

kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

port based network access control (NAC)
prevents access to network until authentication succeeds

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

siem

A

security information and event management