Explaining Common Security Concepts Flashcards

1
Q

Three principles of security control and management. Also know. As the information security triad. Also referred to in reverse order as the AIC triad

A

CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Weakness that could be triggered accidentally or exploited intentionally to cause a security breach

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Potential for an entity to except use a vulnerability that is to breach security.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Likelihood and impact (or consequence) of a threat actor exercising a vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process for verifying compliance with a health policy by using host health checks.

A

Posture assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business or organizational activity that is too critical to be deferred for anything more than a few hours if at all

A

Mission essential function (MEF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations. Also called process assessment.

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specific method by which malware code infects a target host, often via some vulnerability in a software process.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Evaluation of a systems security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system. Also called vulnerability testing.

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Scheme for identifying vulnerabilities developed by MITRE and adopted by NIST

A

Common vulnerabilities and exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Solution that provides real-time or near-real-time analysis or security alerts generated by network hardware and applications

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Test that uses active memory oils and security utilities to evaluate security by simulating an attack on a system. A pen test will verify that a threat exists then will actively test and bypass security controls and will finally exploit vulnerabilities on the system.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Basic principle of security stating that something should be allocated the minimum necessary rights, privileges or information to perform its role.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions

A

Role based access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security design paradigm where any request (host to host or container to container) must be authenticated before being allowed.

A

Zero trust

17
Q

Policies and procedures to identify vulnerabilities and ensure security of the supply chain.

A

Vendor management

18
Q

Collection of access control entries (ACEs) for hat determines which subjects (user accounts, host IPs, and so on) are allowed or denied access to the object and the privileges given (read only, read/write, and so on)

A

Access control list (ACL)

19
Q

Security process that provides identification, authentication and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems and applications.

A

Identity and access management (IAM)

20
Q

Authentication scheme that requires the user to present at least two different factors as credentials from: something you know, something you have, something you are, something you do and somewhere you are. Specifying two factors is known as 2FA.

A

Multifactor

21
Q

OS subsystem that authenticates users when they attempt to start a shell on the host.

A

Local authentication

22
Q

Function that converts an arbitrary length string input to a fixed length string output. A cryptographic hash function does this in a way that reduces the chance of collisions where two different inputs produce the same output. Also called message digest or cryptographic hash.

A

Hashing

23
Q

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

A

Single sign on (SSO)

24
Q

Single sign on authentication and authorization service that is based on a time sensitive ticket granting system.

A

Kerberos

25
Q

Identification and authentication information presented in the X.509 format and issued by a CertificateAuthority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).

A

Digital certificate

26
Q

Framework of certificate authorities, digital certificates, software, services and other cryptographic components deployed for the purpose of validating subject identities.

A

Public key infrastructure (PKI)

27
Q

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers such as fingerprint scanners or smart card teasers for authentication and establish secure tunnels through which to submit credentials.

A

Extensible authentication protocol (EAP)

28
Q

Standard for encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication.

A

IEEE 802.1X Port-based Network Access Control (NAC)

29
Q

AAA protocol used to manage remote and wireless authentication infrastructures

A

Remote Authentication Dial in User Services (RADIUS)

30
Q

AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.

A

Terminal Access Controller Access Control System (TACACS+)

31
Q

Network protocol used to access network directory databases which store information about authorized users and their privileges as well as other organizational information.

A

Lightweight Directory Access Protocol (LDAP)