Security+ section 1 Flashcards

(42 cards)

1
Q

W.I a preventative control give examples

A

it physically blocks a person firewall (technical), on-boarding policy (managerial), guard shake (operational), doorlock (physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

W.I a deterrent control give examples

A

discourages an intrusion attempt splash screen, demotion, reception desk, warning signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

W.I a detective control

A

identifies and logs intrusion attempts. System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

W.I a corrective control

A

performs an action after detection of an intrusion. eg restore backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

W.I a compensating control

A

temporary non-comprehensive correction to an intrusion eg block instead of patrch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

W.I directive control type

A

direct a subject to more secure procedure file storage policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

W.I non-repudiation

A

proof of integrity and proof of origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

W.I the CIA (AIC) triad

A

Availability, integrity (messages cannot be modified without detection), confidentiality (only authorized users see this data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do you get proof of integrity

A

use a hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how do you get proof of origin

A

use a digital signature with a private key which is decrypted using a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I authentication

A

prove who you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I authorization

A

what do you have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I accounting

A

resources used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do you authenticate a system?

A

with a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the data plane?

A

process the frames packets and network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the control plane?

A

manages the actions of the data plane, define policies and rules, determines how packets should be forwarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

W.I adaptive identity

A

consider information other than Authentication information. eg location relationship to organization. Then if needed create stronger authentication

14
Q

W.I threat scope reduction

A

decrease possible entry points

15
Q

W.I security zone

A

the path of connection

16
Q

W.I policy enforcement point

A

gatekeeper of resources

17
Q

policy decision point

A

decider in policy enforcement point

18
Q

W.I. change management

A

policies for making changes to a system

19
Q

W.I. Public key infrastructure(PKI)

A

policies procedures, hardwar, software, people associated with certificates

20
Q

W.I. out of band key exchange

A

exchange not over internet

21
W.I. secure enclave
a protected area for secrets. can be a separate CPU
22
What features does a secure enclave have?
own boot ROM, monitors system boot, true RNG, real-time memory encryption, root cryptographic keys, AES encryption in hardware
23
W.I. steganography
information is hidden inside of other data
24
W.I. data masking
hiding part of the information
25
W.I. a wildcard certificate
1 certificate for man devices using the same domain name
26
W.I. certificate revocation list
a list of certificates you no longer wish to use maintained by certificate authority
27
W.I. online certificate status protocol (OCSP)
scalable OSCP checks
28
name types of threat actors
Nation state, unskilled, hacktivist, insider threat, organized crime, Shadow IT
29
W.I. a watering hole attack
attacker corrupts a 3rd party resource you intend to use
30
W.I. a memory injection attack
injecting malicious code into an other process so that it executes from a legitimate process.
31
W.I. a buffer overflow attack
modifying a variable to use more memory than expect to modify an other variable
32
W.I. a race condition
a variable is used for a process but while its being used it is modified by an other process
33
W.I. a malicious update attack?
malware embedded in an update or when you install a fake update
34
W.I. a cross site scripting attack?
executing code inside a legitimate site
35
W.I. dns poisoning/ spoofing
modification of the host files on a dns server which allows the modification of the response that is sent to requests
36
W.I. domain hijacking
gain access to the full qualified domain name
37
URL hijacking
using URL that is very close to the legitimate site
38