CH2 Flashcards

(14 cards)

1
Q

The CIA Triad

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Prevents denil of actions ensuring accountability and reliabilty in electornic communication and transactions

A

Non-Repuddation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three key aspsects of Non Repudation

A

Digital Signatures, Audit Trails, Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an AAA Server do?

A

Authentication of people, Authentication of Systems, Auhtorization models, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA Protocols - which is a cornerstone of network security. Includes a variety of access devices includeing WAPS, routers and switches

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA Protocol - Advanced version of Radius, used for 4G and 5G along with LTE and WIMAX

A

Diamter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA Protocol - Created by CISCO - Used for Firewalls, Routers and Switches

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A stretegic process that evaluates an orgs security practices against established security standards, regualtions and best practices. This assessment ID’s discrepancies or gaps between the currnety security posture and desired state of security.

A

GAP Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 steps for a GAP Analysis

A

Assessment, Benchmarking, Identificaiton, Prioritzation, Remediation Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Deception and Disruption Technology where security teams are trying to find out the attack methods that hackers are using. They use a website similar to a legitimate website with lower security. This is known as a what?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Groups of honeypost that give an apperance of a network. Used a decoy to draw attackers away from actual network

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A file that acts as ruse, which sets off an alarm

A

Honeyfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Designed to ensnare digital intruders and to track them and get info

A

Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly