Security Flashcards

1
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA

A

Certificate Authority

Digitally signs the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Self-Signed Certificate

A

If only used internally at an organization, no need for a public CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM

A

Identity and Access Management

Give right permissions to right users to prevent unauthorized access
- Identity Management
- Access Control
- Authentication
- Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFA

A

Multi-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSO

A

Single Sign-On

Only need to sign in one time then have access all day to many resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RADIUS

A

Remote Authentication Dial-In User Service

Centralize authentication for users
- Routers, switches, firewalls, servers, VPN, 802.1X net access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LDAP

A

Lightweight Directory Access Protocol

Read/write from directory on net
like phone book

Username, PW
Also other data to use in setting permissions
- CN = Common name - person or unit
- OU = Org Unit
- O = Org
- L = Location
- ST = State
- C = Country
- DC = Domain Component

Example:
CN=WIDGETWEB, OU=Marketing, O=Widget, L=London, C=GB, DC=widget, DC=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A

Security Assertion Markup Language

XML-based

Open standard for Authentication/Authorization
Can auth through 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TACACS+

A

Terminal Access Controller Access Control System Plus

Remote authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TOTP

A

Time-based One-Time Password

Use secret key and time of day to generate temp PW
Synch via NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Attract bad actors
Virtual world for attackers to explore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynet

A

Larger fake network to attract attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Locality

A

Regulation that data gathered in country must remain in that country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GDPR

A

General Data Protection Regulation

European regulation
- PII kept in EU
- Users decide and can request removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PCI DSS

A

Payment Card Industry Data Security Standard

Industry standard
Standard for protecting credit/debit card info/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IIOT

A

Industrial Internet of Things

Machine to machine comms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SCADA

A

Supervisory Control and Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICS

A

Industrial Control System

22
Q

OT

A

Operational Technology

Tech that continued ops depend on - critical infrastructure

23
Q

Guest Network

A

Guests can access but no access to organizational resources

24
Q

VLAN Hopping

A

Switch Spoofing
- Pretend to be a switch
- Send trunk negotiation

Double Tagging
- Create a packet with two VLAN tags
- First tag is removed as it goes through a trunk, now second tag is visable and packet is forwarded to target
- One way trip, no response back out of network
- Change the native VLAN ID, Force tagging of all traffic on native VLAN

25
MAC Flooding
Switch maintains a list of MACs on the network and interface to comm with the MAC Attacker sends many frames with different MACs, fill up MAC table If MAC not found on table, packet is forwarded to all interfaces on switch Turns switch into hub Prevent in switch's port security settings
26
ARP Poisoning
IP Spoofing Attacker pretending to be another IP address ARP: Who has 192.168.1.1 Device responds with its MAC Client caches MAC Client communicates assuming that MAC = 192.168.1.1
27
DNS Poisoning
Same as DNS Spoofing
28
Rogue DHCP server
IP addresses assigned by an unauthorized server No security built into DHCP Countermeasure: - Enable DHCP snooping on switch - Manage authorized DHCP servers in Active Directory - Renew IP leases of devices on network
29
Rogue Access Point
Unauthorized wireless access point May be added by an employee or attacker Creates vulnerable backdoor onto net Countermeasure: - Periodic survey of RF with tools like WiFi Pineapple - Use 802.1X (Network Access Control) -- Must authenticate regardless of how you connected
30
Evil Twin
Access Point set up to look identical to legitimate access point May increase power output to overpower legitimate APs Countermeasures: - Always encrypted traffic/VPN
31
On-Path network attack
Man in the Middle
32
Rootkit
Malware that hides within your OS
33
NAC
Network Access Control Prompt for authentication any time a device plugs in Username, PW
34
Port Security
Prevent new device being plugged into interface Based on MAC Configure specific MACs, Number of MACs
35
ACL
Access Control List Control accesses by Source/Destination IP, Port Number, Time of Day, Application, etc
36
Implicit Deny
Last firewall rule should be to deny any traffic that doesn't match any of the previous rules
37
DAC
Discretionary Access Control give user access/admin on machine
38
MAC
Mandatory Access Control mostly used by gov agencies
39
RBAC
Roll-Based Access Control
40
ABAC
Attribute-Based Access Control based on attributes like time of day, geo location, etc
41
DLP
Data Loss Prevention Monitor data at rest, in motion, in use Analyze net traffic Identify sensitive data, blocks transmission Prevent sensitive data leakage
42
OAuth
Open Authorization Auth protocol to grant 3rd party apps access without sharing their password
43
Kerberos
Authentication protocol developed in the 80s
44
Which of the existing SNMP versions support(s) encryption? (Select all that apply) SNMPv1 SNMPv2c SNMPv3 SNMPv4
SNMPv3 There is no v4
45
Which SNMP version(s) use(s) community strings for authentication? (Select all that apply) SNMPv1 SNMPv2 SNMPv3 SNMPv4
SNMPv1 SNMPv2
46
Which SNMP version(s) send(s) authentication data in an unencrypted form? (Select all that apply) SNMPv1 SNMPv2c SNMPv3 SNMPv4
SNMPv1 SNMPv2c
47
Which of the following answers refer(s) to (a) dedicated software tool(s) designed to monitor and examine the contents of network traffic? (Select all that apply) Port scanner Network mapper Protocol analyzer Data flow controller Packet sniffer
Protocol analyzer Packet sniffer
48
Which of the following answers refers to one of the core functionalities of SIEM? Monitors bandwidth usage across the network Conducts vulnerability assessments Enforces security policies on endpoints Collects, aggregates, and analyzes log data
Collects, aggregates, and analyzes log data
49
Which of the following tools is used for evaluating network efficiency and identifying potential bottlenecks (network performance monitoring)? SNMP Ping Nmap Syslog
SNMP
50
Which of the tools listed below is used to send echo requests to network devices and services to confirm their availability? ICMP Traceroute RDP SNMP
ICMP ping is an ICMP message
51
Examples of protocols specifically designed to provide confidentiality and privacy for DNS data include: (Select all that apply) DNSSEC DoH DTLS DoT SSL/TLS
DoH DoT
52