Chapter 2 Flashcards

(22 cards)

1
Q

Confidentiality, Integrity and Availability (CIA)

A

Safeguards data confidentiality, integrity and accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-repudiation

A

Prevents denial of one’s actions, ensuring accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication, Authorization and Accounting (AAA)

A

Authenticating people: verifies person’s identity

Authenticating systems: Using 802.1x devices are authenticated

Authorization models: controls access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gap analysis

A

Helps you achieve the desired state security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero trust

A

Principle of “never trust, always verify”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control plane

A

Manages and configures network devices and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adaptive identity

A

Flexible approach to identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat scope reduction

A

Reducing the attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policy engine

A

Enforces rules and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policy administrator

A

Executes the policy engine’s decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy-driven access control

A

Automating the enforcement of directives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Implicit trust zones

A

Trusted areas holding resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Subject/system

A

Identifies people/devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Policy enforcement point

A

Monitors and enforces policies within the data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical security

A

Protects people, assets and infrastructure from threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pressure

A

A type of physical security that senses changes in force and translates them into electronic signals

17
Q

Microwave

A

A type of physical security that emits microwave pulses and detects frequency alterations caused by moving objects

18
Q

Ultrasonic

A

A type of physical security that sends out pulses of sound waves and measuring the time it takes for them to return

19
Q

Honeypot

A

Lures attackers so that we can monitor the latest attack methods

20
Q

Honeynet

A

A network of honeypots

21
Q

Honeyfile

A

Bait file designed to detect and track unauthorized access attempts discretely

22
Q

Honeytoken

A

Fictitious data or credentials placed as a trap to detect unauthorized access