Cybersecurity Flashcards

(20 cards)

1
Q

Permitting authorized access to data and information while simultaneously protecting it from inappropriate disclosure is what?

Confidentiality
Integrity
Availability
Non repudiation

A

Confidentiality

Data at rest, in transit

Ex. Obfuscation, Intellectual property, PII, PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Measures degree to something not being corrupted, info at rest or in transit

Confidentiality
Integrity
Availability
Non repudiation

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give me one example of an integrity attack

A

Injection or hijacking
Modifying critical files
Corrupting route and memory tables
Changing access control lists
DNS, arp, dhcp poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maintains timely and reliable access, access resources when needed

Confidentiality
Integrity
Availability
Non repudiation

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of availability attacks

A

Spoofing
Flooding
Dos
Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorizing is the process of verifying or proving the identity of a principal

A

False, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication can operate in character (admin) or network (packet) mode

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensures users can access some resources with one set of credentials but prompt them for more credential when they request elevated access is step up authenticate

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of KBA?

A

Security questions
Public record questions
Live conference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name a tool for no.n repudiation

A

Digital sig
Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measure of the extent to which an entity is threatened by a potential circumstance

Vulnerability
Risk
Threat
Non repudiation

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Total risk is the potential for the occurrence of an adverse event if no mitigation action is taken

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Residual risk is inherent risk

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Result of a risk assessment is what?

A

Risk register or ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Set of assumptions and tolerances that shape and organize approaches to managing risk is risk framing

17
Q

Managerial controls, risk assessment, best practice, password policy, mandatory vacation, separation of duties

A

Administrative controls

18
Q

Deliver confidentiality, integrity, authenticity, availability and non repudiation, detect security requirements

A

Technical controks

19
Q

Infrastructure config, iOS, firewalls, EDR, Soar, are what kind of controls?

20
Q

Protect people and equipment. Security guards, locks, bollsrds are what controls?