cyber Flashcards

1
Q

What is the primary concern of cybersecurity?

A

Protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA Triad stand for in cybersecurity?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by ‘confidentiality’ in cybersecurity?

A

Ensuring that data is not disclosed to unauthorized parties using methods like encryption, access control, and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is ‘integrity’ maintained in cybersecurity?

A

By ensuring data is accurate and unaltered using intrusion detection systems and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘availability’ imply in the context of cybersecurity?

A

Ensuring data and resources are available to users when needed, including redundancy and DDoS prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of an Enterprise Information Security Program Policy (EISP)?

A

Establishes the overall security direction aligned with organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do Issue-Specific Security Policies (ISSP) address?

A

Specific issues like internet use, email policies, and incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What guidelines do System-Specific Security Policies (SSSP) provide?

A

Guidelines for specific systems and technologies like intrusion detection systems and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main function of cryptography in cybersecurity?

A

Maintaining confidentiality and integrity of data through techniques like hashing and encrypting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define ‘symmetric cryptography’.

A

Uses the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ‘asymmetric cryptography’?

A

Uses a public key for encryption and a private key for decryption, enhancing security for key distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of risk assessment in cybersecurity?

A

To prioritize mitigation efforts by assessing the likelihood and impact of potential incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Annualized Loss Expectancy (ALE) in risk assessment?

A

A calculation used to estimate the expected monetary loss per year from an incident, calculated as Single Loss Expectancy (SLE) multiplied by the Annualized Rate of Occurrence (ARO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does TCP/IP stand for and what is its role in network security?

A

Transmission Control Protocol/Internet Protocol; it defines how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed, and received at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of TLS in networking?

A

Transport Layer Security provides confidentiality, integrity, and authentication between application processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does IPv6 enhance network security?

A

IPv6 increases security through a larger address space and built-in support for IPsec, improving address configuration and end-to-end connectivity without NAT.

17
Q

What is the function of IPsec at the Internet Layer?

A

IPsec secures IP communications by authenticating and encrypting each IP packet of a communication session.

18
Q

What are the purposes of the Ping and Traceroute commands?

A

They are network diagnostic tools; Ping is used to test the reachability of a host on an IP network, while Traceroute traces the path that a packet takes to reach the host.

19
Q

How is the network address calculated using an IP address and a subnet mask?

A

By applying a bitwise AND operation between the IP address and the subnet mask.

20
Q

What is the result of inverting a subnet mask and applying a bitwise OR operation with an IP address?

A

It results in the broadcast address for the network segment.

21
Q

What protocols ensure web and remote access security?

A

SSL/TLS for web security, SSH for secure remote access, and IPsec for secure network layer communications.

22
Q

What were the vulnerabilities of Wired Equivalent Privacy (WEP) in WiFi security?

A

WEP had key management issues and was susceptible to statistical analysis and plaintext attacks due to the reuse of initialization vectors.

23
Q

What are the four main types of access control in cybersecurity?

A

Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC).

24
Q

What is a Reference Monitor in the context of access control?

A

A theoretical construct that enforces access controls at the operating system level, ensuring that all access to system resources is controlled and cannot be bypassed.

25
Q

How do Access Control Lists (ACLs) function?

A

ACLs specify which users or system processes are granted access to objects and what operations they can perform.