Domain 5 Flashcards

1
Q

AAA Protocols

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA Protocols
Network Access (Remote Access) Server

A

Is a client to a RADIUS server and the RADIUS server provides AAA services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Access Servers
RADIUS

A

Uses UDP and encrypts the password only

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Servers
TACACS+

A

Uses TCP and encrypts the entire session

Admin access to network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Access Servers
Diameter

A

is based on RADIUS and improves on many of the vulns, but NOT compatible

4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active Directory
Kerberos

A

Primary purpose: authentication
- Allows users to prove their ID
- Also provides some confidentiality and integrity
- Does NOT include logging therefore is does NOT provide accountabilitiy

Common Attacks
- Replay
- Pass-the-ticket (Kerberos) / Pass the hash (NTLM)
- golden ticket
- kerberoasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization Mechanisms
Need To Know

A

Subject with cearance to access is only granted if they Actually need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authorization Mechanisms
Least Privilege

A

Same as need to know, but includes rights to take action on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization Mechanisms
Separation of Duties

A

Sensitive functions are split into tasks performed by 2+ employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Modern Approach to Least Privilege
Just-In-Time (JIT)

A

Allows temporary elevation or privilege (usually time limited) as needed, revoking privilege at the end of allowed window

  • Sometime implemented through ephemeral accounts or a broker and remove access strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Controls
Types (7)

A
  • Preventative
  • Detective
  • Corrective
  • Deterrent
  • Compensating
  • Directive
  • Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Controls
Categories (3)

A
  • Logical / Technical
  • Physical
  • Administrative
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls - Categories
Logical / Technical

A

Hardware or software used to protect

Examples
- encryption
- smart cards
- IDS
- Access Control List
- protocols
- firewalls
- routers
- Clipping levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Controls - Categories
Physical

A

Protect facility and real world objects
- guards, fences, alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Controls - Categories
Administrative

A

Policies and procedures to enforce overall access control
- Focused on personnel and business practices

Examples
- background checks
- security training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Controls - Types
Preventative

A

Stop unwanted activity from occuring

17
Q

Security Controls - Types
Detective

A

Discover unwanted activity.

  • Often are reactive
18
Q

Security Controls - Types
Corrective

A

Restore systems to normal after unwanted activity

Example:
- BCP
- IDS
- antivirus solutions

19
Q

Security Controls - Types
Compensating

A

Provide options to other existing controls to aid in the enforcement and support of a security policy.

Examples:
- A disaster recovery plan with an alternate office location in the event fire suppress fails and building is damaged

20
Q

Security Controls - Types
Directive

A

To direct, confine, or control the actions of subject to force or encourage compliance with security policies

Examples
- Awareness training
- Monitoring
- Security policy

21
Q

Security Controls - Types
Recovery

A

To repair and restore resources

  • More advanced than corrective controls
22
Q

Security Controls - Types
Deterrent

A

Discourage the violation of security policy
- Extends prevention
-

23
Q

Other Attacks
TEMPEST

A

Electronic emanations that every monitor produces to be read from a distance (effective on CRT monitors)

  • Shoulder surfing for monitor displays
24
Q

Other Attacks
White Noise

A

Broadcasting false traffic at all times to mask and hid the presence of real traffic