Chapter 3 and 5 Flashcards

1
Q

span

A

Switch Port Analyzer: known as mirrored ports, it allows a switch to mirror a port’s traffic to another port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Easiest way to deploy a VPN

A

An TLS/SSL vpn which does not require a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decentralized placement to manage multiple data centers.

A

can provide increased resilience because a failure or compromise of service will not disrupt other locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Users want to have a simple experience connecting to company’s resources.

A

TLS VPN does not require a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary reason for parallel processing

A

Allows for systems to be tested without taking them offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the IPsec protocols

A

AH, ESP, IKE (internet key exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can NAC tools allow for authentication?

A

Yes, it can allow for user groups, roles, and VLANS that separate the groups based on roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACL, VLANS, and firewalls can implement network segmentation.

A

air gaps create operational challenges so it’s unlikely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAC

A

NAC helps divide networks into logical security zones for unauthorized access. It uses a software agent, which adds complexity, but it can be agentless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.1X

A

standard for authenticating devices connected to wired and wireless networks using EAP. And it’s used for port based authenticating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port Security

A

allows you to limit the number of MAC addresses that a single port on a switch can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVE

A

is a vulnerability feed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bug Bounty

A

A bug bounty is a program offered by organizations, companies, or even independent software developers to reward individuals (commonly referred to as ethical hackers, security researchers, or bug hunters) who discover and report vulnerabilities or security flaws in their systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

false negative

A

is when an issue exists and it is not identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

false postive

A

is when a scanner picks up and issue but it doesn’t exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Oauth

A

is a common authorization service used by cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SAML

A

security authentication markup language is a language not a service

18
Q

Federation

A

federation refers to the ability of multiple systems, organizations, or platforms to work together while remaining independently managed. Social logins from Google or Facebook are an example of using a federated approach to using identifies.

19
Q

multifactor authentication

A

is based on something-you-have, something-you-are, and something-you-know.

20
Q

geofencing

A

is a location-based technology that creates a virtual geographic boundary around a specified area, enabling software to trigger pre-defined actions when a device enters, exits, or remains within that boundary.

Devices (e.g., smartphones) track their location through GPS, cellular networks, or Wi-Fi and compare it to the geofenced area.

21
Q

Mandatory Access Control (MAC)

A

is a security model that enforces access control policies based on predefined rules set by a central authority, rather than allowing individual users to make decisions about permissions. It will not allow lowered privileged users to see data from higher privileged users.

22
Q

Discretionary access control (DAC)

A

Is when each data owner configures their own security and then delegates the rights and permissions of those objects as they desire. For example assigning who can view, execute, delete files in a Linux OS

23
Q

Role Based Access Control

A

is an access control model that restricts system access based on the roles assigned to users. In this model, permissions are associated with roles, and users acquire permissions through their assigned roles.

Roles:

Represent job functions or responsibilities within an organization (e.g., “Admin,” “Manager,” “Sales Representative”).
Permissions:

Define what actions can be performed on specific resources (e.g., “read,” “write,” “delete”).
Users:

Individuals or entities assigned to one or more roles.

24
Q

ABAC

A

Attribute-Based Access Control (ABAC) is an advanced access control model that grants or denies access to resources based on attributes associated with users, resources, actions, and environmental conditions.

Attributes:

User Attributes: Characteristics of the user (e.g., job title, department, clearance level).

Resource Attributes: Metadata about the resource (e.g., file type, classification, owner).

Action Attributes: The type of action requested (e.g., read, write, delete).

Environmental Attributes: Contextual factors like time, location, or device used.

25
Q

What type of access control does Windows and Linux uses

A

DAC

26
Q

Does Windows log network traffic

A

Windows does not log network traffic.

27
Q

NetFlow

A

is a network protocol developed by Cisco that collects and monitors IP traffic information. It provides visibility into network usage and traffic patterns by capturing metadata about packets flowing through a network.

28
Q

Where does RedHat store authentication logs

A

/var/log/secure

29
Q

What is Cuckoo Sandbox for?

A

is an open-source automated malware analysis system designed to analyze suspicious files and URLs in a controlled and isolated environment. It provides detailed reports on the behavior of malware by executing it in a virtualized or emulated sandbox.

30
Q

What are the seven incident response process

A

Preparation
Detection
Analysis
Containment
Eradication
Recovery
Lesson learned

31
Q

CIS

A

Center for Internet Security provides information on how to secure OSs, applications, or other cover technology.

32
Q

Can IPS/IDS detect behavior patterns

A

No, EDR can and NACs cannot detect behaviors as well, they are designed for access

33
Q

exposure factor

A

the lost in value if an asset that is lost due to loss or damage

34
Q

What are the five Why’s?

A

Who, What, When, Where and Why

35
Q

ABAC

A

provides access based on attributes like location, age, rank, or attributes.

36
Q

What is COPE

A

Company owned personally enabled. Can be used for personal reasons.

37
Q

Quarantine and Isolation are common in what phase of the Incident response?

A

Containment

38
Q

Trend analysis

A

is commonly used for behavior based detection which can help identify new attacks.

39
Q

Where are the advantages of automation?

A

For the provisioning process, decreases the potential for mistakes, provides faster provisioning, improves constitency but it doesn’t address auditability.

40
Q

What are the three components of NIST

A
41
Q

What is a worm

A

They are self install malware and spread themselves

42
Q

ISAC

A

Information Sharing and Analysis Center