Domain 1 Flashcards

1
Q

Ccvv

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example: Using a username and password to log into a system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition: Determines what actions or resources a user is allowed to access after

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

authentication.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example: A manager has access to employee records, but an intern does not.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accounting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Definition: Tracks and records user activities for auditing and monitoring.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example: Logs showing when users log in and what resources they access.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definition: Ensures that data is only accessible to authorized individuals.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example: Encrypting sensitive emails to prevent unauthorized access.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition: Ensures that data remains accurate, consistent, and unaltered unless authorized.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example: Using SHA-256 to verify the integrity of a file after downloading.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Availability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Domain 1: Glossary of Terms 1Definition: Ensures that resources and systems are accessible

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when needed by authorized users.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Example: A website with redundant servers to prevent downtime during high traffic.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Zero Trust

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Definition: A security model that assumes no trust by default and requires continuous

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

verification.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Example: Implementing MFA and network segmentation for all users.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Symmetric Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Definition: Uses the same key for encryption and decryption.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Example: AES (Advanced Encryption Standard) for encrypting database files.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Asymmetric Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Definition: Uses a pair of public and private keys for encryption and decryption.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Example: RSA is used for secure key exchanges during HTTPS connections.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Definition: Converts data into a fixed-length hash value to ensure integrity.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Example: Verifying software integrity using a SHA-256 checksum.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Public Key Infrastructure (PKI)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Definition: A framework for managing digital certificates and public keys.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Example: A website uses a digital certificate to secure HTTPS traffic.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Intrusion Detection System (IDS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Definition: Monitors network traffic for suspicious activities and alerts administrators.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Example: Detecting a brute-force attack on a login page.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Intrusion Prevention System (IPS)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Definition: Monitors and actively blocks identified threats in real time.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Example: Dropping malicious packets from known attackers.

A
42
Q

Multi-Factor Authentication (MFA)

A
43
Q

Definition: Requires multiple verification factors to authenticate a user.

A
44
Q

Example: Logging in using a password and a one-time code sent to your phone.

A
45
Q

Certificate Revocation List (CRL)

A
46
Q

Definition: A list of digital certificates that are no longer valid or trusted.

A
47
Q

Example: A revoked certificate for a compromised server is added to the CRL.

A
48
Q

Online Certificate Status Protocol (OCSP)

A
49
Q

Definition: A protocol used to check the status of a digital certificate in real time.

A
50
Q

Example: A browser checks the validity of a website’s certificate using OCSP.

A
51
Q

Role-Based Access Control (RBAC)

A
52
Q

Definition: Grants permissions based on the user’s role within an organization.

A
53
Q

Example: A doctor can access patient records, but a receptionist cannot.

A
54
Q

Mandatory Access Control (MAC)

A
55
Q

Definition: Access is determined by system-enforced rules and classification levels.

A
56
Q

Example: A user needs “Top Secret” clearance to access certain files.

A
57
Q

Discretionary Access Control (DAC)

A
58
Q

Definition: Access is determined at the discretion of the resource owner.

A
59
Q

Example: A file owner grants specific users access permissions to the file.

A
60
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A
61
Q

Definition: A standard for securing email communications through encryption and digital

A
62
Q

signatures.

A
63
Q

Example: Encrypting an email with S/MIME to prevent unauthorized access.

A
64
Q

Full Disk Encryption (FDE)

A
65
Q

Definition: Encrypts the entire storage drive to protect data at rest.

A
66
Q

Example: A laptop with BitLocker encrypts all files on the disk.

A
67
Q

Access Control List (ACL)

A
68
Q

Definition: A list of permissions attached to an object, specifying who or what

A
69
Q

can access the object and what operations can be performed.

A
70
Q

Example: Firewall rules that allow traffic from specific IP addresses.

A
71
Q

HMAC (Hashed Message Authentication Code)

A
72
Q

Definition: A method for verifying the integrity and authenticity of a message using a

A
73
Q

cryptographic hash function and a secret key.

A
74
Q

Example: Used in APIs to ensure that messages have not been tampered with.

A
75
Q

Transport Layer Security (TLS)

A
76
Q

Definition: A cryptographic protocol designed to provide secure communication over a network.

A
77
Q

Example: Securing data in transit on HTTPS websites.

A
78
Q

Virtual Private Network (VPN)

A
79
Q

Definition: Creates a secure and encrypted connection over a less secure network, such as the

A
80
Q

Internet.

A
81
Q

Example: Remote employees use a VPN to securely access company resources.

A
82
Q

Message Digest 5 (MD5)

A
83
Q

Definition: A hashing algorithm that creates a fixed-size 128-bit hash but is no longer considered

A
84
Q

secure.

A
85
Q

Example: Verifying data integrity in legacy systems.

A
86
Q

Secure Hash Algorithm (SHA)

A
87
Q

Definition: A family of cryptographic hash functions used to ensure data integrity.

A
88
Q

Example: SHA-256 is commonly used to verify file downloads.

A
89
Q

Redundant Array of Independent Disks (RAID)

A
90
Q

Definition: A data storage virtualization technology that combines multiple

A
91
Q

physical disk drives to improve performance or provide redundancy.

A
92
Q

Example: RAID 5 is used for fault tolerance in servers.

A
93
Q

Least Privilege

A
94
Q

Definition: A security principle ensuring users have only the access necessary to perform their

A
95
Q

job functions.

A
96
Q

Example: An intern has read-only access to general documents, not administrative systems.

A
97
Q

Micro-Segmentation

A
98
Q

Definition: Dividing a network into smaller segments for improved security.

A
99
Q

Example: Restricting communication between departments to prevent lateral movement of

A
100
Q

threats.

A