Domain 2: Security Flashcards
Difference between procedural & logical security controls
-Procedural are enforced by people
-Logical are enforced by cyber systems & software
2-step verification
Authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. E.g. email, text or voice call.
Risk
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability
Vulnerability scanner
A class of software designed to detect noncompliant systems
Difference between unprotected system and a noncompliant system
An unprotected system has at least one security control either missing or improperly configured
-a noncompliance system has drifted from its hard configuration
Exploit
Malicious code that can use a vulnerability to compromise a host
True or false: an evil twin is an on-path attack
True
XSS
Cross-site scripting
Malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.
SQL Injection
Structured Query Language Injection
Attack that injects a database query into the input data directed at a server by accessing the client side of the application
Hash
Function that converts an arbitrary-length stream into a fixed-length string input
The main drawback of asymmetric encryption
A message cannot be larger than the key size
For what is asymmetric encryption often used?
To encrypt cryptographic hashes and to encrypt symmetric encryption keys, then referred to as session keys
Exploit
Specific method by which malware code infects a target host, often via some vulnerability in a software process
Why CCMP makes replay attacks harder than TKIP did
CCMP provides authenticated encryption
True or False: enterprise networks support, RADIUS, TACACS+, and Kerberos for authentication
False
Kerberos communication is tunneled & not directly supported
Photo I.D. Authentication type
Something you are
Yellow ports on a home router
LAN ports
How to update the firmware on a router
Download the update from the vendor’s website & then in the management app select the firmware upgrade option and browse for the firmware file you downloaded
How a Soho router performs content filtering
It downloads curated reputation databases
Port forwarding
Process in which a router takes requests from the Internet for a particular app and sends them to a designated host on the LAN
Port triggering
Mechanism to configure access through a firewall for applications that require more than one port
UPnP
Setting on a Soho router that allows an app to send instructions to the firewall with the correct configuration perimeters
DMZ or DMZ host on a home router
A computer on the LAN that is not protected by the router’s firewall
Minimum password length for non-administrative user accounts
12+
Pre-boot authentication
The loading of an authentication application by UEFI firmware in order to contact an authentication server on the network & allow the user to submit the credentials for their account
System user password
A password that is shared by all users & is required before any operating system can boot (very rarely used)
Lunchtime attack
A threat actor is able to access a computer that has been left unlocked
How to lock a Windows computer
From the power icon or START+L
What should happen when the default administrator account is used
Generation of an alert
Where account policies are configured on a standalone workstation
Local Security Policy snap-in
(or
Group Policy Editor snap-in)