Review Flashcards

(54 cards)

1
Q

Identity

A

MFA: Something you know, have, are, do, or are (location)

SSO: One login for multiple apps

Federation: Uses SAML or OAuth

LDAP: TCP 389; RADIUS: UDP 1812; TACACS+: TCP 49

RBAC (Role-Based), ABAC (Attribute-Based)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network

A

HTTPS – 443; SSH – 22; RDP – 3389; DNS – 53

Zero Trust: Always verify

VLANs: Logical network segments

IPsec: Tunnel vs. Transport modes

DMZ: Public-facing zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks

A

Phishing, Smishing, Vishing, Whaling

SQLi, XSS, CSRF, Logic Bomb, Ransomware

MITRE ATT&CK = Threat TTP framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Governance

A

CIA: Confidentiality, Integrity, Availability

RPO = Max acceptable data loss; RTO = Max downtime

HIPAA, PCI-DSS, GDPR = key frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Configuration

A

Hardening: Remove services, patch, change defaults

EDR: Endpoint threat detection

MDM: Mobile policies

DLP: Prevent data leaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incident Response

A

Steps: Prep → ID → Contain → Eradicate → Recover → Learn

Chain of Custody: Evidence integrity

COOP: Keep core services up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tools

A

SIEM: Logs + alerts

SOAR: Automates response

Wireshark: Capture packets

Nmap: Port scanning

Nessus: Vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity & Access Management
What are the 5 authentication factors?

A

Something you know, have, are, do, and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity & Access Management
What is MFA and why is it important?

A

Combines 2+ different types of authentication factors to increase security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity & Access Management
What does SSO allow?

A

One login grants access to multiple systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identity & Access Management
What protocol supports federated identity in SSO?

A

SAML (Security Assertion Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity & Access Management
Difference between OAuth and OpenID Connect?

A

OAuth = authorization; OpenID Connect = adds authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity & Access Management
LDAP vs. RADIUS?

A

LDAP = directory services; RADIUS = AAA over networks, encrypts password only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity & Access Management
Key difference between RADIUS and TACACS+?

A

TACACS+ encrypts entire payload and separates authentication from authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity & Access Management
RBAC vs ABAC?

A

RBAC = based on roles; ABAC = evaluates user/environment attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Architecture & Protocols
What port does HTTPS use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Architecture & Protocols
Difference between stateless and stateful firewall?

A

Stateless = rule-based, doesn’t track sessions; Stateful = tracks connection states

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Architecture & Protocols
What is Zero Trust?

A

“Never trust, always verify”—authentication required at every stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Architecture & Protocols
What does IPsec provide?

A

Authentication, integrity, and encryption for IP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Architecture & Protocols
Difference between IPsec tunnel and transport mode?

A

Tunnel = encrypts entire packet; Transport = encrypts only payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Architecture & Protocols
What is a DMZ?

A

Isolated network zone for public-facing services (e.g., web/mail servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Network Architecture & Protocols
What is a VLAN?

A

Logical segmentation of networks

23
Q

Threats & Vulnerabilities
What is smishing?

A

Phishing via SMS

24
Q

Threats & Vulnerabilities
SQL injection?

A

Alters database queries to gain unauthorized access

25
Threats & Vulnerabilities What is an APT?
Advanced Persistent Threat – prolonged targeted attack
26
Threats & Vulnerabilities CSRF vs. XSS?
CSRF forces users to perform actions; XSS injects scripts into pages
27
Threats & Vulnerabilities What is MITRE ATT&CK?
Knowledge base of adversary tactics, techniques, and procedures
28
Governance, Risk, and Compliance CIA Triad?
Confidentiality, Integrity, Availability
29
Governance, Risk, and Compliance RPO?
Recovery Point Objective – acceptable data loss amount
30
Governance, Risk, and Compliance RTO?
Recovery Time Objective – acceptable system downtime
31
Governance, Risk, and Compliance HIPAA applies to?
Healthcare data
32
Governance, Risk, and Compliance PCI-DSS applies to?
Credit card data
33
Governance, Risk, and Compliance GDPR applies to?
EU citizen data
34
Governance, Risk, and Compliance Risk responses?
Accept, Avoid, Mitigate, Transfer
35
Secure Config & Endpoint What is EDR?
Endpoint Detection & Response – monitors/responds to threats
36
Secure Config & Endpoint What is hardening?
Disabling services, patching, changing defaults
37
Secure Config & Endpoint MDM does what?
Enforces mobile device security policies
38
Secure Config & Endpoint Application allowlisting?
Only approved applications can run
39
Secure Config & Endpoint DLP?
Data Loss Prevention – blocks sensitive data exfiltration
40
Incident Response & Digital Forensics 6 Steps of Incident Response?
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
41
Incident Response & Digital Forensics
Documented control of evidence integrity
42
Incident Response & Digital Forensics What is COOP?
Continuity of Operations Plan – ensures essential services during disruption
43
Tools & Monitoring What does SIEM do?
Aggregates, correlates, and alerts on logs from multiple systems
44
Tools & Monitoring SOAR?
Security Orchestration, Automation, and Response – automates security workflows
45
Tools & Monitoring What does Wireshark do?
Captures/analyzes network packets
46
Tools & Monitoring What does Nmap do?
Scans networks for open ports and services
47
Tools & Monitoring Nessus is used for?
Vulnerability scanning
48
Identity MFA: Something you know, have, are, do, or are (location) SSO: One login for multiple apps Federation: Uses SAML or OAuth LDAP: TCP 389; RADIUS: UDP 1812; TACACS+: TCP 49 RBAC (Role-Based), ABAC (Attribute-Based)
49
Network HTTPS – 443; SSH – 22; RDP – 3389; DNS – 53 Zero Trust: Always verify VLANs: Logical network segments IPsec: Tunnel vs. Transport modes DMZ: Public-facing zone
50
Attacks Phishing, Smishing, Vishing, Whaling SQLi, XSS, CSRF, Logic Bomb, Ransomware MITRE ATT&CK = Threat TTP framework
51
Governance CIA: Confidentiality, Integrity, Availability RPO = Max acceptable data loss; RTO = Max downtime HIPAA, PCI-DSS, GDPR = key frameworks
52
Secure Configuration Hardening: Remove services, patch, change defaults EDR: Endpoint threat detection MDM: Mobile policies DLP: Prevent data leaks
53
Incident Response Steps: Prep → ID → Contain → Eradicate → Recover → Learn Chain of Custody: Evidence integrity COOP: Keep core services up
54
Tools SIEM: Logs + alerts SOAR: Automates response Wireshark: Capture packets Nmap: Port scanning Nessus: Vulnerability scan