Exam 2 Flashcards

1
Q

Data person who manages access rights to the data.

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Directed attack that attempts to obtain private or personal information. Unlike general phishing attacks, this is tailored to the victim and often includes personal information to make the attack more convincing.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability that allows communication between separate VMs.

A

VM escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of wireless attack in which attacker sends unsolicited messages to bluetooth-enabled devices. Usually done to surprise or annoy the user.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows you to create separate virtual local networks within a single physical network. Each separated network acting as its own private network.

A

VLAN - Virtual Local Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method used by routers to allow multiple devices on a local network to share a single public IP address. It translates private IP addresses to the public IP address for outgoing traffic and vice versa for incoming traffic, providing address conservation and an added layer of security.

A

NTA - Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security solution that enforces policies to control which devices can access a network and what they can do once they are connected.

A

NAC - Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Segmentation strategy that separates devices or networks by physically disconnecting them from each other.

A

Air Gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Time concept that defines how much data loss would be acceptable during a recover.

A

RPO - Recovery Point Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network protocol that centralizes the authentication, authorization, and accounting of network access. It simplifies managing user access, enhances security, and provides detailed usage tracking, making it an ideal solution for network environments that require centralized control.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suite of protocols designed to secure internet communications by encrypting and authenticating data packets. Used for securing network communications.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of cyber attack where an attacker gains unauthorized control over a client device or its communications.

A

Clint Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Actions taken to reduce the impact or likelihood of a risk. For example, using security measures like backups to lessen the damage from a ransomware attack.

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ackwnoledging a risk and choosing to deal with the consequences if it occurs, rather than trying to avoid or transfer it.

A

Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shifting the risk to another party, such as by purchasing insurance.

A

Transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Process of installing applications on a device from other source other than the official app store.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used for sending multimedia messages, such as pictures and videos, via text messaging.

A

MMS - Multimedia Messaging Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Sharing a mobile device’s internet connection with another device, such as using a phone’s data connection to provide internet access to a laptop.

A

Tethering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Technology used to combine multiple physical hard drives or solid-state drives into a single logical unit to improve performance, increase storage capacity, or provide redundancy.

A

RAID - Redundant Array of Independent Disks

19
Q

RAID level that splits data across multiple drives, without making copies, and increases speed but no data protection. Preferably not to be use, considered a security risk.

A

RAID 0 (Striping)

20
Q

RAID level that creates an exact copy of data on another disk. If one drive fails, the other still has all data, and requires double the storage (50% usable). Imagine making a copy of every document (mirroring) to ensure you have a backup.

A

RAID 1 (Mirroring & Duplexing)

21
Q

RAID level data is ‘striped’ across multiple disks with parity; makes sure data can be recovered in case of failure. Requires 3 or more disks, and is the most common used RAID.

A

RAID 5 (Striping with Parity)

22
Q

RAID Level that similar to RAID 5 but with extra parity, can tolerate the failure of up to two drives, and usable space is total drives minus two. Think of a double backup system—two extra copies of your document to cover more risks.

A

RAID 6

23
Q

RAID level that mirrors data and then stripes it. Provides both high redundancy and performance, and usable space is half the total storage due to mirroring. Combine both mirroring and striping—having a backup of your backup, plus splitting the work for faster access.

A

RAID 10 (RAID 1+0)

24
Q

Request to sent to a Certificate Authority (CA) to obtain a digital certificate.

A

CSR - Certificate Signing Request

25
Q

Storing a copy of encryption keys with a trusted third party.

A

Key Escrow

26
Q

Method used to check if a website’s security certificate has been revoked without needing to contact the Certificate Authority (CA) directly.

A

OCSP Stapling

27
Q

Provides authentication and integrity for IP Packets. Ensures the data has not been altered and that it comes forma legitimate source.

A

AH - Authentication Header

28
Q

Key exchange protocol used to securely share encryption keys over an insecure channel.

A

Diffie-Hellman

29
Q

Provides both encryption and authentication, it encrypts the data to keep it confidential and authenticates it to ensure it has not been tampered with.

A

ESP - Encapsulating Security Payload

30
Q

Cryptography hash function used to ensure data integrity and authenticity.

A

SHA-2 (Secure hash algorithm 2)

31
Q

Replaces sensitive data with non-sensitive placeholders or tokens that have no meaningful value outside a specific context.

A

Tokenization

31
Q

Principle that involves collection only the data that is necessary for a specific purpose.

A

Minimization

32
Q

This process removes or obscures personal identifiers. Involves altering data so that individuals cannot be identified form it.

A

Anonymization

33
Q

Obscures specific data elements to protect sensitive information while preserving the format and usability of the data.

A

Masking

34
Q

Network diagnostic terminal tool to trace path packets from your computer to a destination.

A

tracert

35
Q

Terminal command tool used to check the reachability of a host on a network and measure roundtrip time for packets.

A

ping

36
Q

Command tool used to query DNS records. It can provide information about domain names, IP addresses, and other DNS related details.

A

dig (Domain Information Groper)

37
Q

Provides backup power to keep servers running during a power outage. Ensures business continuity.

A

UPS

38
Q

Comprehensive penetration testing framework used to find and exploit vulnerabilities in systems.

A

Metasploit

39
Q

Network utility used for reading from and writing to network connections. Cann be used for debugging, port scanning, and data transfer.

A

Netcat

40
Q

Formal contract between a service provider and a customer that defines the expected level of service.

A

SLA - Service Level Agreement

41
Q

Advanced type of firewall that provides enhanced security features beyond those of traditional firewalls.

A

NGFW (Next Generation Firewall)

42
Q

Outdated and insecure wireless security protocol with known vulnerabilities.

A

WEP - Wired Equivalent Privacy

43
Q

Key establishment protocol in WPA3-Personal that enhances security against offline dictionary attacks.

A

SAE - Simultaneous Authentication of Equals

44
Q
A