Midterm Flashcards

Study the midterm (41 cards)

1
Q

IAAA

A

Identification, Authentication, Authorization, Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identification

A

Username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

granting permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accountability

A

tracking user activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi Factor Authentication (MFA)

A

Password + OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Role-Based Access Control (RBAC)

A

Permissions based on job/user roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least Privilege Principle

A

Restricting application permissions so the user can only get necessary access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which authentication method does a company use when employees need both a password and a one-time code sent to their mobile phones to log in?

A

Multi Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phising

A

Fake emails trick users into revealing credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brute force attacks

A

Automated guessing of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session hijacking

A

Stealing an active session to bypass authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privlage esculation

A

Gaining unauthorized admin access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero-day exploits

A

Attacks on unknown vulnrabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hacker steals a session token from a user and gains access tot their banking website without knowing thwe password. What attack is this?

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure coding practices

A

Write, Input, encoding, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Write

A

Developers must write secure code to prevent cyberattacks

18
Q

Input

A

input validation - prevents malicious input (ex. SQL injections, XSS)

19
Q

Encoding

A

Output Encoding - stops cross-site scripting

20
Q

Use

A

use of prepared statements - prevents SQL Injections

21
Q

Which method is the best defense against SQL Injections

A

Using a prepared SQL Statement

22
Q

Web Application Firewall (WAF)

A

Protects against web-based attacks/ Blocks malicous HTTP traffic

23
Q

Aplication Sandboxing

A

Isolates Applications to prevent system-wide access.

24
Q

Patch Management

A

regularly updating software to fix vulnerabilities

25
A company's website is under attack by automated bots trying to inject malicous SQL queries. What security tool is this?
Web Application Firewall (WAF)
26
Network security and attack prevention
Denial-of-Services(DoS) and Distributed DoS (DDoS), Rate limiting and firewalls, Mobile device management(MDM), Endpoint detection and responsse(EDR), Extended detection and response(XDR)
27
Denial-of-Services(DoS) and Distributed DoS (DDoS)
Overloads a system with traffic
28
Rate limiting and firewalls
Prevents DoS attacks
29
Mobile device management(MDM)
Enforcing security policies on mobile apps
30
Endpoint detection and responsse(EDR)
Monitors and responds to endpoint threats
31
Extended detection and response(XDR)
Combines EDR with network, cloud, and application security
32
Penetration Testing
stimulates cyberattacks to find vulnerabilities Most popular uis SNORT
33
Intrusion Detection Systems(IDS)
Detects suspious network activity
34
Plan of Action and Milestones (POAM)
Documents identified risks and actions to fix them Only good for 180
35
A company creates a document listing security weaknesses and assigns deadlines for fixing them. What is this called?
POAM
36
NIST Cybersecurity Framework (NIST CSF)
Identifying, protecting, detecting, responding and recovering
37
ISO 27001
An international standard for information security management
38
A security team identifies all critical digital assets before implementing controls. Which NIST CSF Function is this?
Identity
39
Risk Matrix
Assesses risk based on probablity(likelihood) and impact(Severity)
40
Gap Anaylasis
Identifies diffrences between current security mesures and required standards
41
A company compares its exsisting security controls against ISO 27001 requirements to find missing security mesuares. What process is this?
Gap Anaylasis