Sec+ Domain 1 Flashcards

Jason Dion Course (33 cards)

1
Q

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When referring to Information Security we are talking about the data the system holds or the system itself?

A

The data the system holds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Act of protecting the systems that hold an process the critical data

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 pillars of security?

A

Confidentiality, Integrity, Availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that information is only accessible to those with appropriate authorization.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ensures that data remains accurate and unaltered unless modification is required.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensures that information and resources are accessible and functional when needed by authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the pentagon in security that started as a triad?

A

CIA + NA
Confidentiality, Integrity, Availability,
Non-repudiation, Authenticaion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the AAA of security?

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defines what actions or resources a user can access?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Act of tracking user activities and resource usage, typically for audit or billing purposes.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.

A

Security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero trust model uses the ____ ____ which consists of the adaptive identity, threat scope reduction, policy-driven access control, and secured zones.

A

Control plane

17
Q

Zero trust model uses the ____ ____ which focuses on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.

18
Q

Anything that could cause harm, loss, damage, or compromise to information technology systems.

19
Q

Any weakness in the system design or implementation.

A

Vulnerability

20
Q

Risk is at the intersection of?

A

Threats and vulnerabilities

21
Q

Threat + No Vulnerability = ?

22
Q

Vulnerability + No Threat = ?

23
Q

Threat + Vulnerability = ?

24
Q

Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes.

A

Risk management

25
An authorization model where the owner of the resource decides who is allowed to access it.
Discretionary Access Control (DAC)
26
Give an example of a DAC.
T-Rex is the sole owner of a file and has full discretion to allow or deny access and actions to file.
27
Authorization model where access to resources is determined by a set of rules defined by a central authority.
Mandatory Access Control (MAC)
28
Authorization model that assigns permissions to roles, rather than individual users.
Role-Based Access Control (RBAC)
29
Authorization model that determines access through a combination of contexts and system wide attributes.
Attribute Based Access Control (ABAC)
30
What type of encryption only affects a section of a storage device?
Partition Encryption
31
Encryption that encrypts all data on a physical or logical disk.
Full-disk Encryption
32
Encryption that encrypts individual files or folders on a storage device.
File-level encryption
33
Encryption that encrypts data at the database level.
Database encryption