Sec+ Review Flashcards

(44 cards)

1
Q

Name the 4 control categories

A
  1. Technical
  2. Managerial
  3. Operational
  4. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 control types

A
  1. Preventative
  2. Deterrent
  3. Detective
  4. Corrective
  5. Compensating
  6. Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is non- repudation

A

Prevents denial of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What upholds non- repudation

A

Digital sigs
Audit trails
Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RADIUS

A

Remote authentication dial- in user service. Protocol to manage AAA for users to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 stages of gap analysis

A
  1. Current assessments
  2. Benchmarking
  3. Identification where things fall short
  4. Prioritization
  5. Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero trust control plane

A

Uses subject/identity with company policy, threat intelligence data to decide access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Data plane zones

A
  1. Implicit trust zone - trust assumed
  2. Internal network zone - lan
  3. Dmz - screened subnet
  4. External network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a honeypot do

A

Find attack methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a honey file do

A

Lures attackers and sets off alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a honey tolken

A

Easily tracked dummy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fake info

A

Black hole of fake info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Change management considerations

A

Change advisory board
Approval process
Ownership
Stakeholders
Impact analysis
Yesterday results
Blackout plan
Maintenance windows
Sop’s
Tech implications
Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 Cryptographic tools for securing data

A

Obfuscation
Hashing
Signatures
Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a public key do

A

Encrypts data
Verify sigs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a private key do

A

Employs sig
Decryption

19
Q

What is a key escrow

A

3rd party key safe

20
Q

What is a hsm

A

Hardware security module for securing keys. Ensures integrity of boot, offers authentication, and supports encryption tasks.

21
Q

What is the ssh encryption process

A
  1. 3 way handshake
  2. Encryption
  3. Transmission
  4. Decryption
22
Q

Homomorphic encryption

A

Allows data to be processed while encrypted

23
Q

What is a tpm

A

Trusted platform module. Specialized chip based key manager and os firmware.

24
Q

What is a key management system

A

Software solution for keys

25
TCP three way handshake
1. Syn-synchronize. Packet sent to ask to state a connection. 2. Syn/ACK- SYNCH/Acknowledge - agreement reply 3. Acknowledge- agreeing and confirming the connection
26
What doesn't a business email compromise do?
Request passwords
27
What doesn't brand impersonation do?
Specify the communication channel
28
What does a statefull firewall do?
Analysis traffic patterns For unusual behavior
29
30
What security systems are set up on a LAN?
Ips Ids Load balancer Switches Sensors Internal firewall
31
What security systems are part of the screened subnet?
Ips Ids Jump server Proxy server Reverse proxy Load balancer Sensors Perimeter firewall
32
9 benefits of security zones
1. Segmentation 2. Data protection 3. Access control 4. Monitoring and logging 5. Isolation 6. Compliance 7. Incident containment 8. Operational efficiency 9. Defense of depth
33
What are all the attack surfaces and their vulnerabilities?
1. Endpoints-bad os, software or configs 2. Network services- inadequate patching, misconfiguration or outdated software 3. Ports and protocols 4. User accounts and credentials. 5. 3rd party issues 6. Cloud services 7. Human factors
34
How to mitigate attack surfaces in general?
1. Vulnerability assessments- Nessus 2. Access control 3. Segmentation 4. Build redundancies 5. Constant security updates 6. Strong auth 7. Regular auditing and pen testing. 8. Security awareness for employees
35
What are the 4 security device types?
1. Active-firewalls 2. Passive- cameras, logs 3. Inline 4. Tap/monitor
36
What is a jump server?
Intermediary between clients outside of the network and remote managing critical network components
37
What is a proxy server?
Intermediary between clients and the internet. Filters requests and content.
38
What is a reverse proxy?
Filters requests coming into the network.
39
What is a intrusion protection system?
Identifies suspicious activities and tries to block and mitigate threats
40
What is an intrusion detection system?
Collects data and sounds alarm if problem is detected.
41
What are all network based and host based ips and ids are called?
Nips, nids Hips, hids
42
What are the 2 load balancers and place on OSI
Layer 7: screens by content Layer 4: based on ip and ports
43
4 Load balancer options
1. Least utilized host 2. Affinity: sticky session. Keeps ips with the same server every time a new session is set up 3. Dns round robin 4. Sensors: used by ids to find malicious activity
44
Ways to secure ports
Stickey mac. Store good ip addresses Disable ports when not in use Use radius 802.1x server to check certificates and selectively permit port usage Use extensible authentication protocol(eap)-enhances 802.1x by making sure authentication process is standardized accross all platforms.