Review Questions Flashcards

1
Q

What is hashing in the context of cybersecurity?

A

The practice of transforming a given key or string of characters into another value for the purpose of security . (Think encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is “M of N” in context of key signing and cybersecurity?

A

M of N is multi-user access. (You need multiple people to gain access to something think multiple keycards for one door)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does salting have to be kept secret in context of encryption and or password safety?

A

Salting does not have to kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes plaintext the most effective?

A

The length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does 3-factor authentication include?

A

The third factor is including some sort of bio-metrics. (Fingerprints, facial recognition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When smart cards (key cards) are implemented in security what information is stored on the cards given to employees?

A

A private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does rule based access control include negotiation?

A

No it does not include negotiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security concept uses the idea of minimum permissions.

A

The concept of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give a brief description of identity management.

A

Ensures that authorized people – and only authorized people – have access to the technology resources they need to perform their job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is deprovisioning.

A

Removing a former employees access to software and network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does LDAP stand for

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a distinguised name?

A

Describes the identifying information in a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Kerebos protocol used for?

A

A protocol for authenticating service requests between trusted hosts across an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Should assets that require high confidentiality and high integrity have network access or connections.

A

There should be no network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Zero Trust framework.

A

Zero Trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is scheduling in context of load balancing?

A

To determine which back-end server to send a request to

17
Q

What is used to keep private network secure, encrypted, and at full integrity

A

ESP (encapsulating security payload)

18
Q

What does a Real Time Operating System offer when used?

A

Stability & Speed

19
Q

What does MTD stand for?

A

Maximum tolerable downtime (redundancies help this)

20
Q

What is OSINT?

A

Open-Source Intelligence (publicly known issues posted for the public to keep up to date with vulnerabilities and practices)

21
Q

What does CVE stand for?

A

Common vulnerability and exposure.

22
Q

What do pre-shared keys rely on?

A

The strength of the passphrase key

23
Q

What type of authentication do enterprises use?

A

RADIUS (Remote Authentication Dial-In User Service)

24
Q

What is an alternative to password based authentication that uses digital certificates?

A

EAP-TLS

25
Q

What is a health check that is executed in the hosts memory and CPU but it is not installed?

A

Dissolvable agent

26
Q

What type of attack against HTTPS forces the service to negotiate weak ciphers?

A

A downgrade attack

27
Q

What protocol replaced Telnet?

A

SSH

28
Q

What does the DNSSEC (DNS) depend on?

A

Chain of trust from the root server

29
Q

Give an example of a SIEM and what it does.

A

Splunk, Microsoft Sentinel, LogRhythm.

They collect, organize security events, and help respond to them in the correct priority by severeness.

30
Q

What attack framework gives descriptions of specific TTPs

A

MITREs ATTACK Framework

31
Q

What are indications of an injection attack?

A

% percent encoding. (EXAMPLE: Access logs with repeating requests for URLs with %3C, %3E

32
Q

Forcing requests from the front end to be authenticated prevents what type of attack?

A

Serverside Request Forgery

33
Q

Give an example of capabilities that may be included in password management.

A

Salting, hashing, reset methods

34
Q

What are some potential issues with automation and orchestration?

A

Complexity , single point of failure, cost, support

35
Q

When getting insurance what is the risk mitigation option called?

A

Risk Transference

36
Q

What is a risk register?

A

a document that is used as a risk management tool to identify potential setbacks within a project

37
Q

What legal contract is a non-binding agreement that outlines intentions shared goals, general cooperation?

A

Memorandum of understanding (MOU)

38
Q

What legal document establishes clear guidelines?

A

Rules of Engagement

39
Q

What type of data protection is used by payment processing systems?

A

Tokenization