Sec+ Review Flashcards

(25 cards)

1
Q

Name th 4 control categories

A
  1. Technical
  2. Managerial
  3. Operational
  4. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 control types

A
  1. Preventative
  2. Deterrent
  3. Detective
  4. Corrective
  5. Compensating
  6. Directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is non- repudation

A

Prevents denial of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What upholds non- repudation

A

Digital sigs
Audit trails
Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RADIUS

A

Remote authentication dial- in user service. Protocol to manage AAA for users to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 stages of gap analysis

A
  1. Current assessments
  2. Benchmarking
  3. Identification where things fall short
  4. Prioritization
  5. Remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero trust control plane

A

Uses subject/identity with company policy, threat intelligence data to decide access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data plane zones

A
  1. Implicit trust zone - trust assumed
  2. Internal network zone - lan
  3. Dmz - screened subnet
  4. External network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a honeypot do

A

Find attack methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a honey file do

A

Lures attackers and sets off alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a honey tolken

A

Easily tracked dummy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fake info

A

Black hole of fake info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Change management considerations

A

Change advisory board
Approval process
Ownership
Stakeholders
Impact analysis
Yesterday results
Blackout plan
Maintenance windows
Sop’s
Tech implications
Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 Cryptographic tools for securing data

A

Obfuscation
Hashing
Signatures
Keys

17
Q

What does a public key do

A

Encrypts data
Verify sigs

18
Q

What does a private key do

A

Employs sig
Decryption

19
Q

What is a key escrow

A

3rd party key safe

20
Q

What is a hsm

A

Hardware security module for securing keys. Ensures integrity of boot, offers authentication, and supports encryption tasks.

21
Q

Ssh encryption process

A
  1. 3 way handshake
  2. Encryption
  3. Transmission
  4. Decryption
22
Q

Homomorphic encryption

A

Allows data to be processed while encrypted

23
Q

What is a tpm

A

Trusted platform module. Specialized chip based key manager and os firmware.

24
Q

What is a key management system

A

Software solution for keys

25
TCP three way handshake
1. Syn-synchronize. Packet sent to ask to state a connection. 2. Syn/ACK- SYNCH/Acknowledge - agreement reply 3. Acknowledge- agreeing and confirming the connection