Test Study Flashcards

1
Q

CASB

A

Cloud Access Security Broker

applies security policies to the cloud

views application usage
enforces security policy
verification of compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1x

A

uses a centralized authentication server, and all users can use their normal credentials to authenticate to an 802.1X network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

sets and enforces policies based on characteristics, such as department, location, manager, and time of day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC

A

Discretionary Access Control

the principle of restricting access to objects based on the identity of the subject (the user or the group to which the user belongs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC

A

Mandatory Access Control

controls access to sensitive information in an organization

MAC grants access based on a user’s need to know. Users must prove they need the information before gaining access. The sensitivity of the resource is defined by a security label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RBAC

A

Role Based Access Control

assigns rights and permissions based
on the role of a user. These roles are usually assigned by group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPS

A

Intrustion Prevention System

a network security tool that monitors network traffic for potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HSM

A

Hardware Security Module

Appliance used on the network to store certs and keys for all devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TPM

A

Trusted Platform Module

A chip on individual computers that stores keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annual Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SLE

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

key escrow

A

storing decryption keys with a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hashing

A

one-way cryptographic algorithm that allows for the secure
storage of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSINT

A

open source intelligence
process of obtaining
information from open sources, such as social media sites, corporate
websites, online forums, and other publicly available locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

footprinting

A

the process of using tools and techniques, like using the traceroute commands or a ping sweep – Internet Control Message Protocol sweep – to collect data about a specific target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPsec

A

commonly used as an encrypted tunnel between sites or endpoints.
It’s useful for protecting data sent over the network

17
Q

Insecure Protocols

A

An insecure protocol will transmit information “in the clear,” or without
any type of encryption or protection.

18
Q

Incident Response Process

A

Preparation
Identification
Containment
Eradication
Recovery
Lessons learned

19
Q

netcat

A

reads and writes information to the network

20
Q

Obfuscation

A

Obfuscation is the process of taking something that is normally understandable and making it very difficult to understand. Many developers will obfuscate their source code to prevent others from following the logic used in the application.

21
Q

Confusion

A

Confusion is a concept associated with data encryption where the encrypted data is drastically different than the plaintext.

22
Q

Diamond Model

A

Intrusion Analysis

applies scientific principles to
provide a post-event analysis of an intrusion

23
Q
A
24
Q

memory leak

A

a gradual decline in a computer’s performance over time. It occurs when a program’s RAM is fragmented because it doesn’t free up memory segments when they’re no longer needed. This reduces the amount of available memory, which can cause the system to slow down or stop working correctly.

DDoS and injection attacks

25
Q

functions of a TPM

A
  • store artifacts like passwords, certificates, and encryption keys
  • protect against threats like firmware, ransomware, and DDoS attacks
  • ensure that a host is a known good state and hasn’t been modified
26
Q

ARO

A

Annualized Rate of Occurence

describes the number of instances that an event would occur in a year