All relevance Flashcards

(47 cards)

1
Q
  • What is symmetric encryption?
A

A type of encryption where the same key is used to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • What is asymmetric encryption?
A

Encryption that uses a pair of public and private keys; public key encrypts, private key decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • What is a digital signature?
A

A cryptographic technique for validating the authenticity and integrity of a message using asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • What is a cryptographic hash function?
A

A function that maps input to a fixed-size string with properties like pre-image resistance and collision resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of hash functions?

A

MD5 (weak), SHA-1 (deprecated), SHA-2, SHA-3 (secure alternatives).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is key exchange?

A

The secure process of sharing cryptographic keys between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Diffie-Hellman key exchange?

A

A method of securely exchanging cryptographic keys over a public channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is forward secrecy?

A

A property ensuring that session keys are not compromised even if the long-term key is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of initialization vectors (IVs)?

A

IVs add randomness to encryption to ensure the same plaintext results in different ciphertexts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hybrid encryption?

A

Combines asymmetric encryption for key exchange with symmetric encryption for data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • What is Discretionary Access Control (DAC)?
A

An access policy determined by the owner of the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • What is Mandatory Access Control (MAC)?
A

A model where access is enforced by a central authority based on classification levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • What is Role-Based Access Control (RBAC)?
A

Access rights are based on the roles that users have within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Attribute-Based Access Control (ABAC)?

A

Access is granted based on attributes of users, resources, and the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the principle of least privilege?

A

Users are given the minimum access necessary to perform their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • What is TLS and what does it secure?
A

TLS secures communications over a network by encrypting traffic and authenticating endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is HTTPS?

A

HTTPS is HTTP secured by TLS encryption to protect data exchanged with websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a VPN?

A

A Virtual Private Network that encrypts a user’s internet traffic and masks their IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Kerberos?

A

A network authentication protocol using tickets issued by a trusted third party.

20
Q

What is a security handshake?

A

A negotiation between two parties to agree on encryption algorithms and keys.

21
Q
  • What is the CIA Triad?
A

Confidentiality, Integrity, and Availability — core pillars of security.

22
Q
  • What is the Bell-LaPadula model?
A

A model for maintaining data confidentiality in systems with hierarchical access.

23
Q

What is the Biba model?

A

A model focusing on maintaining data integrity by preventing improper modifications.

24
Q

What is the Clark-Wilson model?

A

A model that enforces data integrity through well-formed transactions and separation of duties.

25
What is defense in depth?
A security strategy using multiple layers of defense to protect information assets.
26
* What is a buffer overflow attack?
An attack where excess data overflows into adjacent memory, allowing potential code execution.
27
* What is a SQL injection?
An attack where malicious SQL commands are injected into an input field.
28
* What is a Cross-site Scripting (XSS) attack?
An attack that injects malicious scripts into trusted websites.
29
What is a Denial of Service (DoS) attack?
An attack that aims to make a system or network unavailable to users.
30
What is a side-channel attack?
An attack that exploits physical implementation details like timing or power consumption.
31
What is phishing?
A social engineering attack to steal sensitive information via deceptive emails or messages.
32
What is a firewall?
A network security device that monitors and controls incoming and outgoing traffic.
33
What is an Intrusion Detection System (IDS)?
A system that monitors for signs of unauthorized access or attacks.
34
What is sandboxing?
A security mechanism to run untrusted code in a restricted environment.
35
What is ASLR?
Address Space Layout Randomization randomizes memory addresses to prevent exploits.
36
What is input validation?
A technique to ensure user inputs are clean and conform to expectations to prevent attacks.
37
What is noninterference in security?
A formal property stating that actions at higher security levels do not affect lower levels.
38
What is model checking?
An automated technique for verifying finite-state systems against formal specifications.
39
What is protocol verification?
The process of proving that a security protocol meets its desired properties.
40
What is social engineering?
Manipulating people into revealing confidential information.
41
What is GDPR?
The General Data Protection Regulation — EU law on data protection and privacy.
42
What is risk assessment?
A systematic process of evaluating potential risks to assets.
43
* How do digital signatures use hashing and public-key encryption?
The sender hashes the message, encrypts the hash with their private key; the receiver decrypts and verifies with the public key.
44
How does TLS use both symmetric and asymmetric encryption?
Asymmetric encryption is used for secure key exchange; symmetric encryption is used for the session.
45
How are authentication and access control related?
Authentication verifies identity; access control defines what an authenticated user can access.
46
How does the principle of least privilege relate to RBAC?
RBAC enforces least privilege by assigning roles with minimum necessary permissions.
47
What is the relationship between confidentiality and encryption?
Encryption enforces confidentiality by ensuring only authorized parties can read data.