Logical Security Flashcards

(79 cards)

1
Q

What is Identity and Access Management (IAM)?

A

Security process for identification, authentication, and authorization of users, computers, and entities

IAM provides access to organizational assets like networks, operating systems, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are the unique subjects in IAM?

A
  • Personnel
  • Endpoints
  • Servers
  • Software
  • Roles

Each subject plays a distinct role in the IAM process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are endpoints in IAM?

A

Devices (desktops, laptops, tablets, cell phones) used to access the network

Endpoints are crucial for user access to organizational resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define roles in IAM.

A

Define permissions based on the function an asset fulfills, applicable to personnel, endpoints, servers, and software

In Windows, permissions are assigned to groups of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is account creation and deprovisioning in IAM?

A

Provisioning new accounts and disabling/deleting existing accounts

This is a fundamental task in managing user access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does account auditing involve?

A
  • Managing permissions
  • Reviewing account activity to ensure legitimacy

Account auditing is essential for maintaining security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the biggest risk in IAM?

A

The risk caused by accounts

User accounts, especially privileged and shared accounts, pose significant risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Privileged accounts have basic permissions.

A

False

Privileged accounts have elevated permissions and require additional auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Multifactor Authentication (MFA)?

A

Authenticating or proving identity using more than one method

At least two methods are required for MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the categories of MFA.

A
  • Something You Know
  • Something You Have
  • Something You Are
  • Something You Do
  • Somewhere You Are

Each category represents a different method of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the weaknesses of passwords?

A
  • Unchanged default credentials
  • Common passwords
  • Weak or short passwords

These weaknesses make passwords vulnerable to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a dictionary attack?

A

Guessing the password using every word or phrase in a dictionary, including variations

This is a common method used by attackers to compromise accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the benefit of using longer and more complex passwords?

A

Harder to crack

Password length and complexity are crucial for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: A possession factor in MFA includes _______.

A

[Smart card, RSA key fob, RFID tag]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of geofencing?

A

Used to track devices and receive alerts if they enter or leave a predefined area

Geofencing is a method to ensure that devices are in an authorized location for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is LDAP?

A

Centralized client/object database containing a hierarchical organization of the users, groups, servers, and systems in the network

LDAP is crucial for managing directory services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Kerberos provide?

A

Windows domain authentication/authorization and mutual authentication

Kerberos issues tickets for authentication and ticket granting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Single Sign-On (SSO)?

A

Single login for multiple resources

SSO simplifies access but can pose security risks if credentials are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is SAML used for?

A

XML-based authentication data exchange

SAML is often used for SSO or federated identity management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is RADIUS?

A

Centralized administration for authentication

RADIUS is commonly used for dial-up, VPN, and wireless authentication.

USES UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does IPSec provide?

A

Authentication and encryption of data packets to create a secure communication path

IPSec is widely used for VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the benefit of Time-Based Authentication?

A

Enhances security, resistant to replay attacks

TOTP is a common implementation of time-based authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define the Least Privilege principle.

A

Users should use the lowest level of permissions necessary to complete job functions

This principle applies to user accounts, system designs, and network configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Discretionary Access Control (DAC)?

A

Access control method where owners of resources determine access permissions

DAC allows owners to assign permissions to files or folders they create.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does Mandatory Access Control (MAC) use to assign trust levels?
Data labels ## Footnote MAC is commonly used in military systems for highly classified information.
26
What is Role-Based Access Control (RBAC)?
Access control model based on defining roles for job functions ## Footnote Permissions are assigned to roles, and users are assigned to those roles.
27
What is data encryption?
Encoding information and allowing access only with the correct security key ## Footnote Encryption is fundamental for securing data.
28
What are the three states of data?
* Data at Rest * Data in Transit/Motion * Data in Use/Processing ## Footnote Each state requires different security measures.
29
What does the Diffie-Hellman Key Exchange allow?
Allows two systems that do not know each other to exchange keys and trust each other ## Footnote This is crucial for establishing secure communications.
30
What is the purpose of the Authentication Header (AH) in IPSec?
Provides data integrity and origin authentication, but not confidentiality ## Footnote AH is part of the security protocols used in IPSec.
31
What is the function of the Encapsulating Security Payload (ESP)?
Provides authentication, integrity, replay protection, and confidentiality of the data ## Footnote ESP is another key component of IPSec.
32
What is Public Key Infrastructure (PKI)?
A system of hardware, software, policies, procedures, and people that is based on asymmetric encryption ## Footnote PKI is essential for secure data transfer and authentication.
33
What is the first step in the process of establishing a secure connection?
Browser requests server's public key from Certificate Authority
34
What does the browser do with the server's public key?
Browser encrypts shared secret key with server's public key
35
What is used to create a secure tunnel for data transfer?
AES
36
List the benefits of using encryption in secure communication.
* Ensures confidentiality of data * Provides authentication of servers * Facilitates secure communication over networks
37
What is Public Key Cryptography?
Encryption and decryption process that is just one small part of the overall PKI
38
What does PKI stand for?
Public Key Infrastructure
39
What is the role of a Certificate Authority (CA)?
A trusted third party that issues digital certificates and maintains trust between CAs worldwide
40
What is Key Escrow?
Secure storage of cryptographic keys, allowing retrieval in cases of key loss or legal investigations
41
What are the challenges associated with Key Escrow?
Security concerns with key escrow and need for strong regulations and security measures to protect keys
42
What is a Digital Certificate?
A digitally signed electronic document that binds a public key with a user's identity
43
What protocol is standard for digital certificates within PKI?
X.509 Protocol
44
What is a Wildcard Certificate?
Allows multiple subdomains to use the same public key certificate
45
What happens if a server using a wildcard certificate is compromised?
The certificate needs to be revoked, affecting all subdomain servers
46
What is the benefit of having one Wildcard Certificate?
Allows quick reissuance and deployment to all servers
47
What is the Subject Alternate Name (SAN) Field?
A certificate that specifies what additional domains and IP addresses will be supported FOR WHEN YOU'RE USING MORE THAN ONE DOMAIN
48
When should a SAN field be used?
To cover multiple domains with one certificate
49
What is the difference between a Single-Sided Certificate and a Dual-Sided Certificate?
Single-Sided Certificate authenticates only the server; Dual-Sided Certificate requires both server and user to validate each other
50
What is a Self-Signed Certificate?
Signed by the entity it certifies and lacks external verification and trust
51
What does a Third-Party Certificate offer?
A higher level of trust and security, issued by a trusted certificate authority (CA)
52
What is the Root of Trust?
Validates certificates in a chain from a trusted root certificate authority
53
What is a Certificate Signing Request (CSR)?
Contains entity details and public key, vital for obtaining a digital certificate from a CA
54
What is a Certificate Revocation List (CRL)?
Maintained by CAs, lists revoked digital certificates to prevent their use
55
What is Key Recovery?
Specialized software to restore lost or corrupted keys
56
What is involved in Key Management?
Generating, exchanging, storing, and using encryption keys securely
57
Why is a strong key essential for encryption?
Weak passwords can compromise the confidentiality of files even with strong encryption algorithms
58
What method is often used to encrypt symmetric keys for secure transmission?
Asymmetric methods
59
What is the importance of Secure Key Exchange?
It ensures the secure transmission of encryption keys
60
What should be done with encryption keys when not in use?
They must be securely stored
61
What is the purpose of Regular Key Rotation?
Keys should be changed periodically to enhance security and reset the clock on potential attacks
62
EXAM username and password is not 2 factor authentication. true or false
TRUE it is single factor
63
What does TACACS+ stand for?
Terminal Access Controller Access-Control System Plus ## Footnote TACACS+ is a Cisco proprietary protocol.
64
What is TACACS+ primarily used for?
Authentication and authorization ## Footnote It is commonly used as an 802.1X network authenticator.
65
What transport protocol does TACACS+ use?
TCP ## Footnote TACACS+ is considered slower than RADIUS due to its use of TCP.
66
What are two benefits of using TACACS+?
* Provides additional security features * Independently conducts authentication, authorization, and accounting processes ## Footnote These features enhance network security and management.
67
What major network protocols does TACACS+ support?
All major network protocols ## Footnote However, it requires Cisco devices for implementation.
68
When using a client to site VPN what mode should you use?
Transport mode because it doesn't increase packet size so you won't breach mtu of 1500 bytes
69
Tunneling mode is usually used for
Site to site VPNs
70
What is Transport Mode?
Uses original IP header ## Footnote Suitable for client-to-site VPNs
71
What is Tunneling Mode?
Encapsulates the entire packet ## Footnote Suitable for site-to-site VPNs
72
What does the Authentication Header (AH) provide?
Data integrity and origin authentication, but not confidentiality ## Footnote AH ensures that the data has not been altered and verifies the identity of the sender.
73
What does the Encapsulating Security Payload (ESP) provide?
Authentication, integrity, replay protection, and confidentiality of the data ## Footnote ESP is used to encrypt the data and ensure secure transmission.
74
What mode do Client-to-Site VPNs typically use for integrity?
Transport mode with AH ## Footnote AH stands for Authentication Header, which provides integrity and authentication for IP packets.
75
What is used for encryption of data in Client-to-Site VPNs?
ESP ## Footnote ESP stands for Encapsulating Security Payload, which provides encryption and optional authentication.
76
What mode do Site-to-Site VPNs typically use?
Tunneling mode ## Footnote Tunneling mode encapsulates the entire packet for secure transmission.
77
Which protocols are typically used by Site-to-Site VPNs for integrity and encryption?
AH and ESP ## Footnote AH provides integrity, while ESP provides both encryption and integrity.
78
Fill in the blank: Client-to-Site VPNs typically use _______ for integrity.
AH
79
Fill in the blank: Site-to-Site VPNs typically use _______ mode for protection of entire packets.
Tunneling