Sec + 6 Flashcards

(27 cards)

1
Q

Kerberos port?

A

88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ipsec port?

A

500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rdp port?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does dns protect against?

A
  1. Blocks access to malicious sites
  2. Content filtering
  3. Enhancing privacy by blocking sites that may collect user data
  4. Security reinforcement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to secure email?

A
  1. S/MIME-uses PKI to either encrypt emails or digitally sign them. Does not scale well due to key exchanges.
  2. Pretty good privacy (PGP)- end to end encryption. Like PKI but not using PKI
  3. Domain based message authentication reporting and conformance (DMARC) - let’s users decide what to do with detected emails
  4. Domainkeys identified Mail (DKIM)- Uses digital signatures. Which can be read only by the recipient.
  5. Sender policy framework (SPF)-
  6. Gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is File integrity Monitoring (FIM)?

A

Establishes a baseline of normal file and system configurations. Alerts when it changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What ensures that every remote device is fully patched and uses agents carried out by the health authority (HAuth)?

A

Network access control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is XDR?

A

Extended detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does EDR work?

A

Data collection
Detection-signature based and behavior analysis
Alerting
Response - tools that the cyber team can use to resolve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XDR components?

A
  1. Geta data from various sources including the EDR, Network detection and response (NDR) and cloud
  2. Enhanced analytics
  3. Automation and orchestration
  4. Scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the active directory and its protocol?

A

Microsoft provisioning tool

Lightweight directory access protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a SID?

A

Security identifier.

Object identifier in active directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What language is used for federation services?

A

Security assertion markup language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does kerberos use to obtain service tickets?

A

TGT
Ticket granting ticket
Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 sso options

A
  1. Kerberos
  2. OAuth- like signing into Google to get into a different website. Uses tokens
  3. SAML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attestation methods for system interoperability?

A
  1. Certificates
  2. Tokens
  3. Federation
  4. Microsoft active directory
17
Q

What is mandatory access control (MAC) and what are the management roles?

A

Mandatory access control

  1. Owner - writes data and determines initial classification ( top secret, secret..
    )
  2. Steward - ensures data accuracy, consistency, and reliability over time.
  3. Custodian- handles technical and physical data management. Data storage and encryption
  4. Security Administrator - provides auth
18
Q

What is RBAC?

A

Role based access control

19
Q

What is ABAC?

A

Attribute based access control.

Location, job title, access time etc…

20
Q

What is discretionary based accessed control (DAC)?

A

Owner gives access. Uses ACL’s

21
Q

What is soft authentication? Give examples.

A

Leverages intangible assets like passwords, pins, or mobile authentication. Only something they know. Can be intercepted

  1. One time password sent to phone
  2. Biometrics
  3. Knowledge based auth (KBA) - Like security questions.
22
Q

What is two-factor auth?

A

Having a token (phone), something you have with a password

23
Q

What is multi factor auth?

A

Something you have
Something you do
Something you know

24
Q

What is NIST?

A

National Institute of standards and technonlogy.

25
Password best practices
1. Length 2. Complexity 3. Password reuse 4. Expiry 5. Max, min age 6. Lockout
26
What is PAM?
Privileged access management. For administration rights. One time use access and has a time limit. Tracks users as well
27
PAM tools
1. Jit permissions 2. Password vaulting - admin accounts removed from regular system to a password vault (software). Tickets are released from there. 3. Ephemeral credentials - one time use