Fundamentals of security Flashcards

1
Q

What does Non-Repudiation guarantee?

A

An action or event cannot be denied (e.g., digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the conditions where no risk exists?

A

If there is a threat but no matching vulnerability, or a vulnerability but no threat, there is no risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Integrity ensure in the context of data?

A

Accuracy and trustworthiness of data over its entire lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are five methods used to maintain data integrity?

A

Hashing, Digital Signatures, Checksums, Access Controls, Regular Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is hashing?

A

A process that converts data into a fixed-size value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does availability ensure in the context of information systems?

A

It ensures that information, systems, and resources are accessible and operational when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is redundancy in the context of systems and network design?

A

It is the duplication of critical components or functions to enhance the reliability of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of redundancy in system and network design?

A

Server Redundancy, Data Redundancy, Network Redundancy, and Power Redundancy are types of redundancy used to improve reliability and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a digital signature and how is it created?

A

A digital signature is unique to each user. It is created by hashing a message and then encrypting the hash with the user’s private key using asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five commonly used authentication methods?

A

Something you know (Knowledge Factor)
Something you have (Possession Factor)
Something you are (Inherence Factor)
Something you do (Action Factor)
Somewhere you are (Location Factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Multi-Factor Authentication (MFA)?

A

A security process that requires users to provide multiple methods of identification to verify their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of Syslog Servers?

A

They aggregate logs from various network devices and systems for analysis to detect patterns or anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do Network Analysis Tools do?

A

They capture and analyze network traffic, offering detailed insights into data movement within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Security Information and Event Management (SIEM) Systems?

A

They provide real-time analysis of security alerts generated by hardware and software infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Gap Analysis?

A

A process that evaluates the differences between an organization’s current performance and its desired performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps involved in conducting a gap analysis?

A

Define the scope of the analysis.
Gather data on the current state of the organization.
Analyze the data to identify gaps between current and desired performance.
Develop a plan to bridge the identified gaps.

17
Q

What is Technical Gap Analysis?

A

It involves evaluating an organization’s current technical infrastructure to identify deficiencies relative to the technical capabilities required for optimal security solutions.

18
Q

What is Business Gap Analysis?

A

It involves evaluating an organization’s current business processes to identify deficiencies relative to the capabilities required to fully utilize cloud-based solutions

19
Q

What is Zero Trust?

A

A security model that demands verification for every device, user, and transaction within the network, regardless of origin.