Logical Security Flashcards

(79 cards)

1
Q

What is the goal of logical security?

A

Protect digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logical security helps prevent what?

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IAM manage?

A

Identification, authentication, authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which accounts must be audited more strictly?

A

Privileged accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why should shared accounts be avoided?

A

No accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does provisioning do in IAM?

A

Creates new accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does deprovisioning prevent?

A

Stale account risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What IAM task resets passwords or changes permissions?

A

Managing accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What logs are reviewed during IAM audits?

A

Authentication events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What authentication type uses passwords or PINs?

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is username + password not MFA?

A

Same category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s an example of “something you have”?

A

RSA token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of “something you are”?

A

Fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Behavior-based authentication uses what factor?

A

Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What factor involves GPS/geolocation?

A

Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which password attack uses common words?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which attack tries every possible combo?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hybrid attacks mix what?

A

User info + brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What password length is considered strong?

A

12+ characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TOTP generates codes based on what?

A

Time + shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does MFA defend against?

A

Credential compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What authentication method stores credentials on the device?

A

Local authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which protocol centralizes user authentication across systems?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What ports are used by LDAP and LDAPS?

A

389, 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which protocol uses tickets and avoids sending passwords?
Kerberos
26
What port does Kerberos use?
88
27
What is the Kerberos KDC responsible for?
Issuing service tickets
28
What is SSO used for?
One login to access multiple systems
29
What’s a key risk with SSO?
One password breach = full access
30
What protocol allows federated identity via assertions?
SAML
31
Who authenticates in a SAML exchange?
Identity Provider
32
What network protocol supports AAA over UDP?
RADIUS
33
Which Cisco protocol uses TCP and encrypts full packets?
TACACS+
34
What port does TACACS+ use?
49
35
What is the goal of Least Privilege?
Limit access to minimum needed
36
Which access model is owner-controlled?
DAC
37
Which model assigns labels like “Secret” or “Top Secret”?
MAC
38
What access model ties permissions to job roles?
RBAC
39
Why is DAC risky in enterprises?
Owner misconfigurations
40
Why is RBAC scalable?
Permissions tied to roles, not users
41
What is encryption used for?
Confidentiality
42
Plaintext data is also called what?
Clear text
43
What type of encryption uses the same key to encrypt/decrypt?
Symmetric
44
What encryption uses separate keys for encrypt/decrypt?
Asymmetric
45
What protects stored data?
Full disk encryption
46
What protects data in transit?
TLS, VPN
47
What protects data in use?
Secure enclaves
48
What are the three states of data?
At rest, in transit, in use
49
What protocol secures IP communications?
IPSec
50
What are IPSec's four goals?
Confidentiality, Integrity, Authentication, Anti-replay
51
What protocol is used to exchange keys in IPSec?
IKE
52
What key exchange method does IPSec use?
Diffie-Hellman
53
What does AH in IPSec provide?
Integrity
54
What does ESP in IPSec provide?
Encryption + integrity
55
Which IPSec mode encrypts entire packet?
Tunnel
56
Which mode leaves IP header visible?
Transport
57
What causes fragmentation in IPSec?
Increased packet size
58
What should you adjust if IPSec breaks large packets?
MTU
59
What is PKI based on?
Asymmetric encryption
60
What role issues and signs certificates?
Certificate Authority (CA)
61
What component verifies users before certs are issued?
Registration Authority (RA)
62
What standard defines cert structure?
X.509
63
What does the browser use the server’s public key for?
Encrypt session key
64
What does the server use its private key for?
Decrypt session key
65
What happens after the HTTPS handshake?
Symmetric encryption
66
What is stored securely for key recovery?
Key escrow
67
What happens if a root CA is compromised?
All certs revoked
68
Wildcard certs can secure what?
All subdomains
69
What cert type is common on public sites?
Single-sided
70
What cert authenticates both sides?
Dual-sided
71
Why do self-signed certs trigger browser warnings?
No trusted third-party
72
What is a Certificate Revocation List (CRL)?
List of invalidated certs
73
What is included in a CSR?
Public key + identity info
74
What’s a SAN in a certificate?
Supports multiple domain names
75
What does the chain of trust link?
Root CA → Intermediate CA → Cert
76
What helps enforce certificate expiration?
Validity period
77
What ensures a message sender can’t deny it?
Non-repudiation
78
What can decrypt data if the user forgets their password?
Key Recovery Agent
79
Why are third-party certs trusted by browsers?
Issued by known CA