Domain 2 Flashcards

1
Q

What is the purpose of authentication?

A

Verify identity

Authentication is the process of confirming a user’s identity before granting access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does authorization entail?

A

Granting access to resources

Authorization determines what resources a user can access after their identity has been authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the focus of accounting in security?

A

Tracking user activities

Accounting involves monitoring and recording user actions to ensure compliance and detect anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability

The CIA Triad is a model designed to guide policies for information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by confidentiality in the context of the CIA Triad?

A

Ensuring Data Privacy

Confidentiality involves protecting information from unauthorized access and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define integrity as part of the CIA Triad.

A

Maintaining data accuracy

Integrity ensures that data is accurate and unaltered, except by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does availability refer to in the CIA Triad?

A

Ensuring data is accessible when needed

Availability ensures that authorized users have access to data and resources when required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What methods can be used to ensure confidentiality?

A
  • Encryption
  • Access Control Lists (ACLs)

These methods help protect sensitive information from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is integrity typically ensured?

A

Hashing (Storing the hash to verify the file)

Hashing generates a unique value for data that can be used to verify its integrity over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is non-repudiation?

A

Preventing denial of actions

Non-repudiation ensures that a user cannot deny having sent a message or performed an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of honeypots in security?

A

Distracting attackers with decoy systems

Honeypots are traps set to lure attackers away from valuable resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technology do proximity readers use for access control?

A

RFID technology

Proximity readers utilize Radio-Frequency Identification (RFID) to allow or deny access based on proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly