Cloud and Wireless Security Flashcards

1
Q

What is it called when someone in an organization looks at the data they have in their organization, and start to classify it based on its privacy and confidentiality level?

A

Data classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which data classification includes data about people that must be kept private, organizations must use proper security controls to be in compliance?

A

Private Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What data classification involves information or data owned by the organization including intellectual property, customer lists, pricing information, and patents?

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What data classification involves information or data shared internally by an organization, although confidential information and/or data may not be included, communications are not intended to leave the organization?

A

Internal use only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What data classification involves information or data shared with the public, such as website content, white papers, and the like?

A

Public domain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of access control has each individual owner of a resource manage their own access control policy?

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of access control groups users into common categories and applies permissions to those categories and refer to them as roles?

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of access control have permissions based on attributes such as location, time, or device?

A

Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of access control has access allowed or denied based on fixed rules?

A

Rule-based Access Control (RuBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of access control is based on the context or state of the transaction and evaluates the situation or environment in which the access request is being made?

A

Context-based Access Control (CBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call stored, inactive data?

A

Data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you call data being transmitted over a network?

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four aspects of access control?

A

Identification, Authentication, Authorization, and Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which aspect of access control are assertions made by users about who they are?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which aspect of access control is proving identification?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which aspect of access control are the permissions of a legitimate user or process has on the system?

A

Authorization

17
Q

Which aspect of access control is tracking or logging what users do while accessing the system?

A

Accountability

18
Q

What is the weakest wireless encryption standard?

A

Wired Equivalent Privacy (WEP)

19
Q

What is the second weakest wireless encryption standard?

A

Wi-Fi Protected Access (WPA)

20
Q

What wireless encryption standard is most commonly used today?

A

WPA2

21
Q

What is the strongest wireless encryption standard?

A

WPA3

22
Q

Which wireless network infrastructure mode a type of network where devices communicate directly with each other without a central access point?

A

Ad-hoc

23
Q

Which wireless network infrastructure mode is network type that involves devices connecting through a central access point, like a router, which facilitates a more stable and organized network structure?

A

Infrastructure

24
Q

What type of attack involves an attacker providing malicious SQL statements to access unauthorized data or carry out unauthorized commands?

A

SQL injection attack

25
Q

What attack involves setting up a rouge AP for the legitimate users to sniff data?

A

Evil twin or rogue access point attack

26
Q

What attack involves an attacker fooling the network into addressing packets to his or her computer by supplying its MAC address to the network in response to ARP requests, once the ARP information is set, packets are routed through the attacker’s computer, captured, and then forwarded to the legitimate recipient?

A

Arp poisoning or arp spoofing attack

27
Q

What attack forces a wireless client (or all wireless clients) off of the wireless network?

A

Deauthentication attack