OBJ 4.1 X Flashcards

1
Q

Confidentiality, integrity, availability (CIA)

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common vulnerabilities and exposures (CVE)

A

A list of publicly disclosed computer security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero-day

A

Brand new vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploits

A

Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Least privilege

A

Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role-based access

A

Discretionary Access Control (DAC) -An access control method where access is determined by the
owner of the resource

Mandatory Access Control (MAC)
● An access control policy where the computer system gets to decide who gets access to what objects

Role-Based Access Control (RBAC)
▪ An access model that is controlled by the system but focuses on a set of
permissions versus an individual’s permissions
▪ Creating groups makes it easy to control permissions based around actual job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero Trust

A

A security framework that requires users to be authenticated and
authorized before being granted access to applications and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defense in depth

A

Cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information
▪ Physical
▪ Logic
▪ Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Terminal Access Controller Access-
Control System Plus (TACACS+)

A

Used to perform the role of an authenticator in an 802.1x network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote Authentication Dial-in User Service (RADIUS)

A

Provides centralized administration of dial-up, VPN, and wireless network
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP

A

Validates a username and password combination against an LDAP server
as a form of authentication
● Port 389 LDAP
● Port 636 LDAP Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberos

A

▪ Focused on authentication and authorization within a Windows domain environment

▪ Provides secure authentication over an insecure network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Local authentication

A

Process of determining whether someone or something is who or what it
● Claims itself to be
● Simplified version of X.500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extensible Authentication Protocol (EAP)

A

Allows for numerous different mechanisms of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Management

A

The identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly