Concepts Flashcards

(38 cards)

1
Q

Concept

A

Breakdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk Management

A

Identify, Assess, Mitigate, Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Models

A

MAC, DAC, RBAC, ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Methods

A

Something you know, have, are, do, or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

Symmetric vs Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewalls

A

Packet-filtering, Stateful, Application-layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDS/IPS

A

Intrusion Detection/Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

A

Phishing, Pretexting, Tailgating, Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware Types

A

Virus, Worm, Trojan, Ransomware, Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Controls

A

Preventive, Detective, Corrective, Deterrent, Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ports and Protocols

A

Know common ports and their use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN

A

Secure tunnel between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patch Management

A

Update software to fix vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero Trust

A

Never trust, always verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public Key Infrastructure (PKI)

A

Manages digital certificates and encryption keys

17
Q

Multi-Factor Authentication (MFA)

A

Requires two or more authentication factors

18
Q

Incident Response

A

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

19
Q

Symmetric Encryption

A

One key for both encryption and decryption

20
Q

Asymmetric Encryption

A

Uses a public and private key pair

21
Q

Hashing

A

Produces a fixed-length string from input data

22
Q

Security Policies

A

Guidelines for employee behavior and IT usage

23
Q

Network Segmentation

A

Dividing network into zones

24
Q

SIEM

A

Security Information and Event Management

25
Physical Security
Controls that protect the physical environment
26
Threat Intelligence
Gathering data on potential or active threats
27
Sandboxing
Isolating programs to prevent harm to the system
28
Cloud Security
Securing data and systems in the cloud
29
DDoS Attack
Distributed Denial of Service
30
Concept
Breakdown
31
Zero Trust Architecture
Security model that assumes no implicit trust; always verify identity, device, and context before granting access
32
Elliptic Curve Cryptography (ECC)
Asymmetric encryption technique using elliptic curves over finite fields
33
OAuth 2.0 and OpenID Connect
OAuth 2.0: authorization framework; OpenID Connect: authentication layer on top of OAuth
34
Security Information and Event Management (SIEM)
Aggregates and analyzes logs and events in real-time for threat detection
35
Advanced Persistent Threat (APT)
Prolonged and targeted cyberattack often conducted by a nation-state or highly skilled group
36
Security Orchestration, Automation, and Response (SOAR)
Technology that helps unify and automate security operations and incident response
37
Public Key Infrastructure (PKI)
Framework for creating, managing, distributing, and revoking digital certificates
38
Data Loss Prevention (DLP)
Technology and policies that prevent unauthorized data transmission or leakage