Chapter 1 Flashcards

(47 cards)

1
Q

What are the main objectives of security controls?

A

Prevent security events, minimise impact, and limit the damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four categories of security controls?

A

Technical, Managerial, Operational, and Physical Controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA Triad in cybersecurity?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is confidentiality maintained?

A

Encryption, access controls, two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What mechanisms support integrity?

A

Hashing, digital signatures, certificates, non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is availability ensured?

A

Fault tolerance, redundancy, patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is non-repudiation in cybersecurity?

A

Proof of integrity and origin, ensuring authenticity using cryptographic methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a hash function?

A

To represent data as a short, fixed-size string and verify integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three A’s in access control?

A

Authentication, Authorization, and Accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital certificate used for?

A

To authenticate devices using a trusted Certificate Authority (CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Gap Analysis?

A

A comparison of current security posture against desired goals to identify improvement areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Zero Trust?

A

A security model where nothing is trusted by default, and verification is required for all devices and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the functional planes in Zero Trust architecture?

A

Data plane, Control plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are honeypots used for?

A

To attract and trap attackers in a controlled environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is change management?

A

A formal process for managing updates to systems to avoid disruption and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of version control?

A

To track changes and enable reversion if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Public Key Infrastructure (PKI)?

A

A system for creating, managing, and validating digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is symmetric encryption?

A

Encryption and decryption using the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is asymmetric encryption?

A

Uses a pair of public and private keys; only the private key can decrypt data encrypted with the public key.

20
Q

What is key escrow?

A

A third party holds a decryption key for recovery or access purposes.

21
Q

What is full-disk encryption?

A

Encrypting all data on a storage device (e.g., BitLocker, FileVault).

22
Q

What is transport encryption?

A

Encryption of data in transit using protocols like HTTPS or VPN.

23
Q

What is hashing used for?

A

To verify data integrity by creating a fixed-size digest from input data.

24
Q

What is a digital signature?

A

A cryptographic method to verify the authenticity and integrity of a message using a private key.

25
What is a blockchain?
A distributed ledger used to record transactions across multiple nodes securely.
26
What does a digital certificate contain?
Serial number, version, signature algorithm, issuer, subject name, public key, and extensions.
27
What is OCSP stapling?
An efficient method for verifying certificate status during SSL/TLS handshake.
28
What is tokenisation?
Replacing sensitive data with a non-sensitive placeholder; commonly used in credit card processing.
29
What is data masking?
Obfuscating data to hide some original information, protecting PII.
30
What is key stretching?
Strengthening weak keys by hashing them multiple times to slow brute-force attacks.
31
What is a hash collision?
When two different inputs produce the same hash output; indicates a flaw in the hashing algorithm.
32
Why are salted hashes important?
They prevent rainbow table attacks by adding randomness to each hashed password.
33
What is a secure enclave?
An isolated processor with its own memory, boot ROM, and crypto features for securely handling sensitive data.
34
What is the role of a Certificate Authority (CA)?
To validate identities and digitally sign certificates to establish trust.
35
What is a wildcard certificate?
A certificate that applies to all server names within a domain using a wildcard name.
36
What is a self-signed certificate?
A certificate signed by the same entity that created it, often used internally.
37
What is a Certificate Revocation List (CRL)?
A list maintained by a CA that shows revoked certificates.
38
What is an Access Control Vestibule?
A physical security feature that controls access by locking and unlocking doors sequentially.
39
What are honeynets?
Networks designed with multiple honeypots to simulate real environments and attract attackers.
40
What is a policy enforcement point (PEP)?
A gatekeeper component that allows, monitors, or terminates connections based on policy.
41
What is the function of a Policy Engine in Zero Trust?
Evaluates access requests using policies and other inputs to make grant/deny decisions.
42
What are the steps in the Change Approval Process?
Request submission, scope identification, impact analysis, risk assessment, scheduling, board approval, user acceptance.
43
Why is sandbox testing important in change management?
To test changes in a safe environment without affecting production systems.
44
What is the purpose of a backout plan?
To revert a change if something goes wrong, ensuring business continuity.
45
What is the difference between allow and deny lists?
Allow lists permit only approved applications; deny lists block known bad applications.
46
Why are legacy applications challenging in change management?
They may be unsupported and undocumented, requiring special handling during changes.
47
What is the benefit of version control in IT?
Tracks file/configuration changes over time, enabling rollback and auditing.