701 Flashcards

Secuirty

1
Q

Term

A

Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain 1: General Security Concepts

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technical: Security controls implemented through technology (e.g.

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical: Physical barriers and controls to protect resources (e.g.

A

locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deterrent: Controls that discourage violations (e.g.

A

warning signs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compensating: Alternative controls that compensate for weaknesses (e.g.

A

increased monitoring).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA Triad:

A

Confidentiality: Ensuring that information is accessible only to those authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability: Ensuring that information is accessible when needed.

A

Non-repudiation: Ensuring that a party cannot deny the authenticity of their signature or actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication: Verifying the identity of a user or system.

A

Authorization: Granting permissions to authenticated users or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authenticating people/systems: Methods used to verify identities (e.g.

A

passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control Plane: Manages the flow of data to enforce policies.

A

Data Plane: Carries the actual data or application traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bollards: Physical barriers to prevent vehicle access.

A

Access control vestibule: Small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Video surveillance: Monitoring using cameras.

A

Security guard: Human security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lighting: Use of light to deter or detect unauthorized access.

A

Sensors: Devices to detect movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeypot: Decoy systems to attract attackers.

A

Honeynet: Network of honeypots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeytoken: Decoy data used to detect unauthorized access.

A

Cryptographic Solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public key: Key used to encrypt data

A

known to everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption: Converting data into a coded form.

A

Full-disk: Encrypting all data on a disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File: Encrypting individual files.

A

Volume: Encrypting a specific volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Record: Encrypting individual records.

A

Transport/communication: Encrypting data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Symmetric: Encryption using a single key for both encryption and decryption.

A

Key exchange: Method of securely exchanging encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key length: Length of the encryption key.

A

Tools:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HSM (Hardware Security Module): Device for managing cryptographic keys.

A

Key management system: Software for managing encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Obfuscation:

A

Steganography: Hiding data within other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data masking: Obscuring data to protect sensitive information.

A

Hashing: Converting data into a fixed-size string of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Digital Signatures: Cryptographic signatures to verify authenticity.

A

Key Stretching: Techniques to strengthen keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Certificates: Digital certificates used for authentication.

A

Certificate authorities: Entities that issue certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

OCSP (Online Certificate Status Protocol): Protocol for checking certificate status.

A

Self-signed: Certificates signed by the entity itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Root of trust: Base level of trust in a security model.

A

CSR (Certificate Signing Request): Request for a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Change Management

A

Business Processes:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ownership: Responsibility for changes.

A

Stakeholders: Parties affected by changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Test results: Outcomes of testing changes.

A

Backout plan: Plan for reverting changes if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SOP (Standard Operating Procedure): Established procedures for tasks.

A

Technical Implications:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Restricted activities: Actions that are limited.

A

Downtime: Period when systems are unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Application restart: Restarting applications.

A

Legacy applications: Older software systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Documentation:

A

Updating diagrams: Keeping architectural diagrams current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Version Control: Managing changes to documents or code.

A

Domain 2: Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Threat Actors:

A

Nation-state: Government-sponsored attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hacktivist: Activists using hacking.

A

Insider threat: Internal personnel posing a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Shadow IT: Unapproved IT systems or devices.

A

Attributes:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Resources/funding: Financial and material support.

A

Level of sophistication/capability: Skills and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Data exfiltration: Stealing data.

A

Espionage: Spying activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Blackmail: Forcing action through threats.

A

Financial gain: Monetary benefits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Ethical: Driven by moral principles.

A

Revenge: Retaliation motives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

War: Conflict motives.

A

Threat Vectors and Attack Surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Image-based: Attacks hidden in images.

A

File-based: Attacks in files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Removable device: Attacks via USB drives.

A

Vulnerable software (Client-based vs. agentless): Exploiting software weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Unsecure networks (Wireless

A

Wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Supply chain (MSPs

A

Vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Application:

A

Memory injection: Injecting malicious code into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Race conditions (TOC/TOU): Exploiting timing issues.

A

Malicious update: Compromised software updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Web-based:

A

SQLi (SQL Injection): Injecting SQL commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Hardware:

A

Firmware: Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Hardware:

A

Firmware: Vulnerabilities in the firmware of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Network:

A

DNS poisoning: Corrupting DNS cache to redirect traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

DDoS (Distributed Denial of Service): Overloading a service with excessive traffic.

A

Cloud:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Misconfiguration: Incorrectly configured cloud services.

A

Mobile:

58
Q

Unsecure connections: Unencrypted or poorly secured connections.

A

IoT (Internet of Things):

59
Q

Unpatched firmware: Vulnerabilities in outdated firmware.

A

Industrial control systems (ICS):

60
Q

Unsecure protocols: Use of unsecure communication protocols.

A

Exploit Techniques

61
Q

Phishing: Fraudulent attempts to obtain sensitive information.

A

Spear phishing: Targeted phishing attacks.

62
Q

Pretexting: Creating a fabricated scenario to steal information.

A

Baiting: Offering something enticing to lure victims.

63
Q

Network attacks:

A

Man-in-the-middle: Intercepting communication between two parties.

64
Q

Replay attack: Reusing captured data packets.

A

Spoofing: Impersonating another device or user.

65
Q

Virus: Malicious code that attaches to a host file and spreads.

A

Worm: Self-replicating malware that spreads without user interaction.

66
Q

Ransomware: Malware that encrypts data and demands payment for decryption.

A

Spyware: Malware that collects information without consent.

67
Q

Rootkit: Malware designed to gain root-level access.

A

Code-based attacks:

68
Q

Cross-site scripting (XSS): Injecting malicious scripts into web pages.

A

Buffer overflow: Exploiting buffer overflow vulnerabilities to execute arbitrary code.

69
Q

USB drop attack: Leaving malicious USB drives for victims to use.

A

Hardware keyloggers: Physical devices that record keystrokes.

70
Q

Security Assessment

A

Vulnerability assessments: Identifying and evaluating security weaknesses.

71
Q

Security audits: Reviewing and evaluating security measures.

A

Risk assessments: Identifying and analyzing risks.

72
Q

Bug bounty programs: Offering rewards for finding security vulnerabilities.

A

Mitigation Strategies

73
Q

Firewalls: Devices or software that control network traffic based on security rules.

A

Intrusion detection systems (IDS): Systems that detect unauthorized access.

74
Q

Network segmentation: Dividing networks into segments to improve security.

A

Endpoint security:

75
Q

Endpoint detection and response (EDR): Tools for detecting and responding to endpoint threats.

A

Patch management: Keeping software up to date with patches and updates.

76
Q

Code review: Examining code for vulnerabilities.

A

Application hardening: Securing applications by reducing vulnerabilities.

77
Q

Data protection:

A

Encryption: Converting data into a coded form to prevent unauthorized access.

78
Q

Access controls: Restricting access to data based on user roles and permissions.

A

Physical security:

79
Q

Access control systems: Systems that control entry to physical spaces.

A

Surveillance cameras: Cameras used to monitor physical spaces.

80
Q

Incident response planning: Preparing for and responding to security incidents.

A

Domain 3: Architecture and Design

81
Q

Network Architecture:

A

Intranet: Internal private network.

82
Q

DMZ (Demilitarized Zone): Network segment that separates internal networks from untrusted networks.

A

NAC (Network Access Control): Policies to control access to network resources.

83
Q

SDN (Software-Defined Networking): Network management using software.

A

Microsegmentation: Dividing networks into smaller segments.

84
Q

Public cloud: Cloud services offered to multiple customers.

A

Private cloud: Cloud services for a single organization.

85
Q

Community cloud: Cloud services shared by a community of organizations.

A

Virtualization: Creating virtual versions of resources.

86
Q

Containers: Lightweight virtualization for applications.

A

Virtual networks: Virtualizing network resources.

87
Q

Zero Trust Architecture: Security model that assumes no implicit trust.

A

Control Plane: Manages the flow of data to enforce policies.

88
Q

Security Frameworks and Models

A

Security Frameworks:

89
Q

ISO/IEC 27001: Standard for information security management systems.

A

COBIT: Framework for managing and governing IT.

90
Q

CSA (Cloud Security Alliance): Guidelines for cloud security.

A

Security Models:

91
Q

Biba Model: Security model focused on data integrity.

A

Clark-Wilson Model: Security model focused on data integrity through well-formed transactions.

92
Q

Secure System Design

A

Principles of Secure Design:

93
Q

Separation of duties: Dividing responsibilities to prevent fraud.

A

Defense in depth: Using multiple layers of security.

94
Q

Economy of mechanism: Keeping security mechanisms simple.

A

Complete mediation: Checking access permissions every time a resource is accessed.

95
Q

Least common mechanism: Minimizing shared security mechanisms.

A

Psychological acceptability: Security mechanisms should not be overly complex for users.

96
Q

Secure Protocols:

A

SSL/TLS: Protocols for secure communication over a network.

97
Q

IPsec: Protocol suite for securing Internet Protocol (IP) communications.

A

Virtual Private Networks (VPNs):

98
Q

Remote access VPN: VPN that allows individual users to connect to a network.

A

Wireless Security:

99
Q

WPA2: Wi-Fi security protocol using AES encryption.

A

WEP: Older

100
Q

Antivirus/anti-malware: Software that detects and removes malicious software.

A

EDR (Endpoint Detection and Response): Tools for detecting and responding to endpoint threats.

101
Q

Application control: Restricting applications that can be run on endpoints.

A

Cloud Security

102
Q

Cloud Security Controls:

A

CASB (Cloud Access Security Broker): Tools that provide visibility and control over cloud applications.

103
Q

Encryption: Protecting data in transit and at rest in the cloud.

A

Monitoring: Continuously monitoring cloud environments for threats.

104
Q

Compliance: Ensuring cloud environments meet regulatory requirements.

A

Data Security

105
Q

Public: Data that can be freely shared.

A

Internal: Data meant for internal use only.

106
Q

Top secret: Highly sensitive data with the highest level of protection.

A

Data Retention: Policies for how long data should be kept.

107
Q

Data Masking: Obscuring data to protect sensitive information.

A

Tokenization: Replacing sensitive data with non-sensitive tokens.

108
Q

contunue with the other domian

A

ChatGPT

109
Q

Continuing with the definitions for Domain 4 and Domain 5:

A

Domain 4: Security Operations and Monitoring

110
Q

Log Types:

A

Event logs: Logs generated by operating systems

111
Q

Audit logs: Logs that track changes and access to data and systems.

A

Log Management:

112
Q

Log aggregation: Combining logs from different sources for analysis.

A

Log correlation: Analyzing logs to identify patterns and relationships between events.

113
Q

SIEM (Security Information and Event Management): Tools that provide real-time analysis of security alerts.

A

ELK Stack (Elasticsearch

114
Q

Security Monitoring:

A

Network monitoring: Tracking and analyzing network traffic for signs of malicious activity.

115
Q

Application monitoring: Tracking and analyzing application performance and behavior.

A

Continuous Monitoring: Ongoing assessment of security controls and risk.

116
Q

Anomaly Detection: Identifying unusual patterns or behaviors that may indicate a security incident.

A

Trend Analysis: Identifying trends and patterns over time to predict future security incidents.

117
Q

Incident Response

A

Incident Response Process:

118
Q

Identification: Detecting and identifying potential security incidents.

A

Containment: Limiting the impact of the incident.

119
Q

Recovery: Restoring systems and operations to normal.

A

Lessons Learned: Reviewing and improving the incident response process.

120
Q

Incident Response Plan: Documented plan detailing how to respond to security incidents.

A

Forensics: Collecting and analyzing digital evidence related to security incidents.

121
Q

Threat Intelligence Sources:

A

Open source: Publicly available threat intelligence data.

122
Q

Internal: Threat intelligence data generated within the organization.

A

Threat Intelligence Types:

123
Q

Tactical: Detailed intelligence related to specific threats and attack methods.

A

Operational: Intelligence related to ongoing threats and incidents.

124
Q

Threat Intelligence Sharing: Sharing threat intelligence data with other organizations and communities.

A

Vulnerability Management

125
Q

Penetration Testing: Simulated attacks to identify vulnerabilities and assess security controls.

A

Patch Management: Process of applying patches and updates to software and systems to address vulnerabilities.

126
Q

Domain 5: Incident Response

A

Forensics

127
Q

Identification: Detecting and determining the nature of an incident.

A

Containment: Isolating affected systems to prevent further damage.

128
Q

Recovery: Restoring systems and operations to normal.

A

Lessons Learned: Reviewing the incident and improving response processes.

129
Q

Digital Forensics: Collecting

A

preserving

130
Q

EnCase: Digital forensics software for examining data.

A

FTK (Forensic Toolkit): Digital forensics tool for data analysis.

131
Q

Forensic Analysis:

A

Disk imaging: Creating a bit-by-bit copy of a storage device.

132
Q

Memory forensics: Analyzing volatile memory (RAM) for evidence.

A

Legal Considerations: Ensuring compliance with laws and regulations during forensic investigations.

133
Q

Disaster Recovery (DR):

A

DR Plan: Documented strategy for recovering IT systems and data after a disaster.

134
Q

DR Testing: Regular testing of disaster recovery plans and procedures.

A

Recovery Time Objective (RTO): Target time to restore systems after a disaster.

135
Q

Business Continuity (BC):

A

BC Plan: Documented strategy for maintaining business operations during and after a disaster.

136
Q

Business Impact Analysis (BIA): Identifying critical business functions and their dependencies.

A

Continuity of Operations: Ensuring essential functions continue during a disruption.

137
Q

Internal Communication: Coordinating communication within the organization during incidents.

A

External Communication: Communicating with external stakeholders

138
Q

Incident Coordination: Collaborating with external organizations

A

including law enforcement and industry groups.

139
Q

GDPR (General Data Protection Regulation): EU regulation on data protection and privacy.

A

HIPAA (Health Insurance Portability and Accountability Act): US regulation on health data privacy.

140
Q

SOX (Sarbanes-Oxley Act): US regulation on corporate financial practices and disclosures.

A

FISMA (Federal Information Security Management Act): US regulation on federal information security.

141
Q

Compliance Audits: Regular audits to ensure compliance with laws and regulations.

A

Data Breach Notification: Informing affected individuals and authorities about data breaches.