chapter 1: General Knowledge Flashcards
to study sec +
What is a wildcard certificate?
A wildcard certificate is a single Secure Sockets Layer (SSL) or Transport Layer Security (TLS) certificate that secures a domain and all of its subdomains.
What is a Gap Analysis?
Control objectives and controls intended to meet the objectives
What is git?
A distributed version control system that tracks versions of files.
What are SOP’s?
Standard Operating Procedures, which describes the activities necessary to complete tasks in accordance with industry regulations, provincial laws or even just your own standards for running your business
What are the main different types of security controls?
Technical, Administrative, and Physical
What is the purpose of the Technical Security control?
Consists of the hardware and software components that protect a system against cyberattack. (i.e. Firewalls, Intrusion Detection Systems, Encryption, Identification and Authentication Mechanisms, etc.)
What is the purpose of the Physical security control?
to protect an organization’s physical assets from theft, vandalism, or unauthorized access. (i.e. Locks and Keys, Access Cards and Badges, Biometric Systems, Backup Generators, Alarm Systems, etc.)
What is a Brute Force attack?
a cyberattack that uses trial and error to gain access to an account or network by guessing passwords, login credentials, or encryption keys.
What does Key Stretching do?
a cryptography technique that makes a weak key, such as a password or passphrase, more secure.
What does Key Rotation do?
the process of regularly replacing encryption keys with new ones to reduce the risk of a key being compromised.
What is salting?
a cybersecurity technique that adds a random string of characters to a password before it is hashed and stored, making it more difficult for attackers to access passwords.
What is Symmetric Encryption?
a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data.
What is Asymmetric Encryption?
also known as public key cryptography, is a process that uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use.
What are Diffie-Hellman and RSA an example of?
methods used to securely exchange or establish secret keys across insecure networks.
How does the Diffie-Hellman Key Algorithm work?
The Diffie–Hellman (DH) Algorithm is a key-exchange protocol that enables two parties communicating over public channel to establish a mutual secret without it being transmitted over the Internet. DH enables the two to use a public key to encrypt and decrypt their conversation or data using symmetric cryptography.
How does the RSA Key Exchange work?
The sender encrypts the data with their public key, and the receiver decrypts it with their private key
What is a backout plan?
a strategy for reversing changes made to a system if they cause issues.
What is an impact analysis?
a process that examines the potential consequences of a change to a system, process, or project.
What is a regression test?
a test to find out whether the updates or changes had caused new defects in the existing functions.
What are the three categories of the CIA Triad?
Confidentiality, Integrity, and Availability
What is a maintenance window?
a set time period when routine changes or planned outages can occur to systems and services.
What does Confidentiality mean in the CIA Triad?
Protecting the privacy and proprietary information of an organization by controlling access to data and preventing unauthorized sharing
What does Integrity mean in the CIA Triad?
Ensuring that data is accurate, authentic, and reliable, and that it’s protected from tampering or destruction
What does Availability mean in the CIA Triad?
Ensuring that information is accessible and usable in a timely and reliable manner