1. General Security Concepts Flashcards

1
Q

1.1 Categories of Controls

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1 Control Types

A

Preventative, Deterrent, Detective, Corrective, Compensating, Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1 Operational vs. Managerial control categories

A

managerial is policies and training, operational is changes in daily operating procedures such as recovery plans, audits, and change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.2 AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.2 Gap analysis

A

evaluate current posture against standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.2 Gap analysis steps

A
  1. establish a baseline
  2. identify gaps
  3. analyze cause
  4. develop an action plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.2 Zero-trust control plane vs data plane

A

Control plane are policies and configurations such as RBAC, reducing threat scope, and adaptive identity of users

Data plane: technologies such as firewall and network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.2 PEP vs. PDP

A

PEP is the gatekeeper (inline network) and communicates with PDP

PDP is made up of the Policy Administrator and Policy Engine, not inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.2 Physical security sensors

A

infrared, pressure, microwave, ultrasonic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.2 Deception and disruption technology

A

Honeypot, Honeynet, Honeyfile, Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.3 what is ownership in change management?

A

refers to who delegates responsibilities for change, not necessarily who does the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.3 Technical implications of change management

A

Restricted activities such as configuration settings, downtime, service restarts, legacy applications, dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.4 CA vs RA

A

RA is an intermediary between users and CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.4 OCSP (relates to certificates)

A

Online Certificate Status Protocol, internet protocol to determine cert revocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.4 Self-signed certificate

A

Can still verify the source because of the key pair usage, but the source is not necessarily trusted by the CA. Used in internal networks for development and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.4 CSR (relates to certificates)

A

Certificate Signing Request, block of code to request cert from CA

17
Q

1.4 Key Escrow

A

keys stored with a third party

18
Q

1.4 AES key length

A

128, 192, 256

19
Q

1.4 RSA key length

A

2048, 4096

20
Q

1.4 TPM

A

Trusted Platform Module, security chip that provides tamper resistance for cryptographic activity

21
Q

1.4 Secure Enclave

A

Area within CPU that is an isolated environment. runs things like Face ID.

22
Q

1.4 HSM

A

Hardware Security Module, dedicated hardware device for managing digital keys

23
Q

1.4 KMS

A

Key Management System, framework for managing key lifecycle

24
Q

1.4 Data Masking

A

Obscures data by altering values, static (copy of data) and dynamic (altered as it is accessed in real time)

25
Q

1.4 Tokenization

A

replaces sensitive data with non-sensitive, like card number tokens

26
Q

1.4 Key Stretching

A

running data through an algorithm multiple times

27
Q

1.4 How are digital signatures produced?

A

a hash is created and then encrypted with private key. People use public key to decrypt, and then hash their message to compare to the original hash.