1 Flashcards

1
Q

Categories of security controls

A

Technical, managerial, operational, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technical controls

A

Technology-based measures such as
firewalls and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Managerial controls

A

Policies, procedures, and guidelines
for security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational controls

A

Day-to-day security practices such
as monitoring and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical controls

A

Measures to safeguard physical assets and premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of security controls

A

Preventive, deterrent, detective, corrective, compensating, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Preventive controls

A

Aimed at preventing security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deterrent control

A

Intended to discourage potential attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detective controls

A

Focused on identifying and detecting
security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective controls

A

Implemented after an incident to
mitigate the impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compensating controls

A

Alternative measures to compensate for inadequate primary controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Directive controls

A

Policies or regulations providing
specific guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidentiality, Integrity, and Availability (CIA)

A

Safeguards data confidentiality, , integrity, and accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality

A

Ensures that sensitive information remains shielded from prying eyes and that access is granted solely to those with the appropriate authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integrity

A

Prevents unauthorized changes or
manipulations to your information, maintaining its accuracy and reliability. Hashing algorithms such as SHA1 or MD5 provide data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Availability

A

Ensures that your systems are up and running, that your data can be accessed promptly, and that your online services remain accessible.

17
Q

Non-repudiation

A

Prevents denial of one’s actions, ensuring accountability

18
Q

Authentication

A

Purpose: To verify the identity of a user or system.
Process: Involves checking credentials like passwords, PINs, or biometric data (fingerprints, facial recognition).

19
Q

802.1X protocol

A

802.1X takes the lead in authenticating devices seeking access to a network, and each device must have a valid certificate on its endpoint.

20
Q

Authorization

A

Purpose: To determine what an authenticated user or system is allowed to do.
Process: Involves setting permissions and access levels for different resources.

21
Q

Accounting

A

This process involves capturing essential details such as usernames, timestamps, IP addresses, accessed resources, and actions performed

22
Q

AAA server

A

A guard responsible for three important tasks: authentication, authorization, and accounting.

23
Q

AAA protocols

A

RADIUS, Diameter, and TACACS+

24
Q

Gap analysis

A

Gap analysis is a strategic process that evaluates an organization’s security practices against established security standards, regulations, and industry best practices.

25
Q

Key taks of gap analysis

A

Assessment, benchmarking, identification, prioritization, remediation strategy

26
Q

Zero trust

27
Q

Control plane

A

The part of a network that controls how data packets are forwarded. The process of creating a routing table, for example, is considered part of the control plane

28
Q

Data plane

A

In contrast to the control plane, which determines how packets should be forwarded, the data plane actually forwards the packets. The data plane is also called the forwarding plane.

29
Q

Control plane vs Data plane

A

Think of the control plane as being like the stoplights that operate at the intersections of a city. Meanwhile, the data plane (or the forwarding plane) is more like the cars that drive on the roads, stop at the intersections, and obey the stoplights.

34
Q

Control plane 115