Domain 1.0 - General Security Concepts Flashcards

1
Q

What are technical security controls?

A

Technical controls are controls that protect computer networks, software and data. Examples include firewalls and data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are managerial security controls?

A

Managerial controls encompass the implementation of policies, procedures and practices by management to guide and direct the activities of individuals and teams. Examples include performance reviews, risk assessments, and codes of conduct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are operational security controls? Who implements them?

A

Operational controls revolve around the execution of day-to-day activities and processes necessary for delivering goods and services. Examples include incident response procedures, security awareness training and user access management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are physical security controls?

A

Physical controls are controls that protect the actual building or facility. Examples include an access control vestibule, biometric locks, security guards, fences, CCTV systems, mantraps, vehicle barriers, tamper evident seals, and panic buttons/alarms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are preventative security controls?

A

Preventative controls are designed to prevent problems or risks from occurring in the first place. Examples include firewalls to prevent unauthorized access to computer networks using access control lists, employee training programs to educate staff about safety procedures and prevent workplace accidents, and quality control checks in a manufacturing process to prevent defects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are deterrent security controls?

A

They aim to discourage people from engaging in undesirable behavior or activities. They create a perception of risk or negative consequences to deter potential offenders. Examples of deterrent controls include surveillance cameras in public areas to deter criminal activity, warning signs indicating the presence of a security system to discourage burglars, and strong passwords and MFA to discourage unauthorized access to online accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are detective security controls?

A

These are used to identify and detect problems or risks that have already occurred. Examples include financial audits and SIEM software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are corrective security controls?

A

Corrective controls address problems or risks after they have been identified. Examples of corrective controls include implementing a backup and recovery system to restore data after a system failure and implementing fixes or patches for software vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are compensating security controls?

A

Compensating controls are alternative measures implemented when primary controls are not feasible or sufficient. Examples of compensating controls include requiring additional layers of approval for financial transactions in the absence of automated control systems, utilizing a secondary method of authentication when the primary method fails or is unavailable, and increasing physical security measures when technical controls are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are directive security controls?

A

Directive controls involve providing specific instructions or guidelines to ensure compliance with policies, procedures or regulations. Examples of directive controls include a code of conduct or ethical guidelines that outline acceptable behavior within an organization, stand operating procedures (SOPs) that detail step-by-step instructions for completing tasks, and regulatory requirements that mandate specific reporting procedures for financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CIA triad and what does CIA stand for? Define each letter.

A

CIA stands for confidentiality, integrity and availability. Confidentiality ensures that only those with proper authorization can access sensitive information. Integrity ensures that the data remains unaltered. Availability ensures that the data remains accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is non-repudiation?

A

This prevents denial of actions, ensuring accountability and reliability in electronic transactions and communications. This is done through authentication, digital signatures and audit trails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the AAA security concept and what does each letter stand for? Define each letter.

A

AAA stands for authentication, authorization and accounting. AAA is handled by an AAA server which is software on a computer server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are people authenticated in AAA?

A

When a user initiates an authentication request, the AAA server interfaces with the domain controller - the specialized server responsible for managing user accounts and authentication within a Windows domain environment. A AAA server can work with various methods of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are systems authenticated in AAA?

A

Using the AA framework and the 802.1x protocol. 802.1x is used to authenticate devices to the network and each device must have a valid certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are authorization models?

A

They define the scope of permissible activities on a network which creates a controlled environment that mitigates the risks associated with unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is accounting in AAA?

A

This process involves capturing essential details such as usernames, timestamps, IP addresses, accessed resources, and actions performed. This data is then stored securely, ensuring its integrity and confidentiality. The accounting information can be used for real-time monitoring, historical analysis, and generating reports for compliance or troubleshooting purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the AAA protocols?

A

The AAA protocols include RADIUS, Diameter and TACACS+.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is RADIUS? What does it stand for?

A

RADIUS stands for Remote Authentication Dial-In User Service. RADIUS is used particularly in remote access scenarios. RADIUS clients can include wireless access points, routers, and switches. The authentication requests from the clients require a shared secret. This secret, known to both the RADIUS client and server, safeguards the exchange of sensitive data, improving the integrity of the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Diameter?

A

Diameter is RADIUS’s successor. It works with 4G, 5G and LTE and WiMAX access points. The shared secret is important with Diameter as with RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is TACACS+? What does it stand for? What is it used for?

A

TACACS stands for Terminal Access Controller Access Control System Plus. It was created by Cisco and is used to grant or deny access to network devices. TACACS+ clients often include routers, switches and firewalls. The shared secret is important for secure communications with TACACS+ as it is with Diameter and RADIUS.

22
Q

What is gap analysis?

A
23
Q

What is zero trust?

A
24
Q

What is a zero trust control plane?

A
25
Q

What is adaptive identity?

A
26
Q

What is threat scope reduction?

A
27
Q

What is policy-driven access control?

A
28
Q

In zero trust what is the policy administrator?

A
29
Q

What is a policy engine?

A
30
Q

What is a zero trust data plane?

A
31
Q

What are implicit trust zones?

A
32
Q

In a zero trust data plane what is subject/system?

A
33
Q

What is a policy enforcement point?

A
34
Q

What is physical security?

A
35
Q

What are bollards?

A
36
Q

What is an access control vestibule?

A
37
Q

Explain the role of fencing in physical security.

A
38
Q

How is video surveillance used in physical security?

A
39
Q

What is a security guard’s role in physical security?

A
40
Q

Explain acsess badges used in physical security.

A
41
Q

How is lighting used in physical security?

A
42
Q

How are sensors used in physical security?

A
43
Q

What is an infrared sensor?

A
44
Q

What is a pressure sensor?

A
45
Q

What is a microwave sensor?

A
46
Q

What is an ultrasonic sensor?

A
47
Q

What is deception and disruption technology?

A
48
Q

What is a honeypot?

A
49
Q

What is a honeynet?

A
50
Q

What is a honeyfile?

A
51
Q

What is a honeytoken?

A