N2K - Flash Cards - General Security Concepts - Summarize Fundamental Security Concepts

(31 cards)

1
Q

In the data plane, what term refers to entities requesting access to resources?

A

Subject/System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of security mechanism lures attackers by simulating valuable files?

A

Honeyfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of threat scope reduction?

A

To minimize the potential impact of security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a network of decoy systems designed to detect and observe malicious activity?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which control plane component evaluates and enforces security policies in real-time?

A

Policy Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of sensor detects motion by emitting microwave signals and analyzing reflections?

A

Microwave Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of sensor triggers alarms upon detecting changes such as footsteps?

A

Pressure Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of sensor detects heat signatures to identify potential threats?

A

Infrared Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access control method enforces rules based on predefined policies?

A

Policy-Driven Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the control plane, who is responsible for creating and managing security policies within an organization?

A

Policy Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which data plane component enforces access control policies at the network perimeter?

A

Policy Enforcement Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which environmental security measure illuminates areas to deter intruders?

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which logical part of a network architecture processes and forwards user traffic?

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a bollard?

A

A bollard is a physical security control that prevents cars from accessing certain areas. They are most often deployed in front of retail storefronts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which logical component of a network architecture manages traffic forwarding decisions?

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a honeypot?

A

A decoy system in your network installed to lure potential intruders away from legitimate systems

17
Q

What is an access control vestibule?

A

Also called a mantrap, it is a door system that allows for someone to be physically identified prior to entering the facility.

18
Q

Which category of controls includes controlling access to different parts of a building, implementing locking systems, installing fencing, implementing environmental controls, and protecting the facility perimeter?

A

Physical Controls

19
Q

Which security model assumes no trust, even within internal networks?

20
Q

Which security concept adjusts user privileges dynamically based ontheir behavior, their connecting devices, and/or their location?

A

Adaptive Identity

21
Q

Which physical credential grants entry to secure areas?

22
Q

Which security concept assumes all network traffic in a particular segment is trusted by default?

A

Implicit Trust Zones

23
Q

Which type of sensor uses high-frequency sound waves to detect movement or presence?

A

Ultrasonic Sensors

24
Q

Which security concept ensures that a sender cannot deny the authenticity or integrity of a message?

A

Non-Repudiation

25
Which physical security measure involves human presence to monitor and respond to threats?
Security Guard
26
What is the term for a server that has been configured specifically to distract an attacker from production systems?
Honeypot
27
Which physical security measure uses cameras to monitor and record activities?
Video Surveillance
28
What are the two planes of responsibility in zero trust?
Control plane and data plane
29
Which assessment method identifies discrepancies between the current and the desired security states?
Gap Analysis
30
Which concept provides the proof of origin of data, preventing the sender from claiming they were not the one who sent it?
Non-Repudiation
31
What is a honeynet?
When two or more honeypots are implemented on a network