Lesson 1 Flashcards

1
Q

confidentiality

A

A cybersecurity objective that ensures unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network access control (NAC)

A

The collected protocols, policies, and hardware that govern access on a device’s network interconnections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

advanced persistent threat (APT)

A

A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

risk

A

A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

threat

A

An outside force that may exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

vulnerability

A

A weakness in a device, a system, an application, or a process that might allow an attack to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

integrity

A

A cybersecurity objective that ensures there are no unauthorized modifications to information or systems, which can be either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

availability

A

A cybersecurity objective that ensures information and systems are accessible to authorized users at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

sandboxing

A

A cybersecurity practice where you run, observe, and analyze and code in a safe and isolated environment on a network, called “sandbox”, that isolates the host machine from the potentially malicious program or unsafe code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

demilitarized zone (DMZ)

A

A special network zone designed to house systems that receive connections from the outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A threat actor who gains unauthorized access to a computer network and remains undetected for an extended period.

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The collected protocols, policies, and hardware that govern access on a device’s network interconnections.

A

network access control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A special network zone designed to house systems that receive connections from the outside world

A

demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The pentbox cd pentbox-1.8/

A

is an open-source security suite that houses many security and stability testing-oriented tools for networks and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

iptables is a command-line interface that is used

A

to set up and maintain tables for the Netfilter firewall for IPv4, which is included in the Linux kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

web application firewalls (WAFs)

A

WAFs are specialized firewalls designed to protect against web application attacks, such as SQL injection and cross-site scripting.

17
Q

Any device that wishes to join an 802.1x authentication must be running an 802.1x

A

supplicant that can communicate with the authenticator before joining the wireless network.

18
Q

The Remote Access Dial-In User Service (RADIUS) protocol is an authentication protocol used for communications

A

between authenticators and the authentication server during the 802.1x authentication process

19
Q

The red team plays the role of the

A

attacker and uses reconnaissance and exploitation tools to attempt to gain access to the protected network. The red team’s work is similar to that of the testers during a penetration test.

20
Q

The blue team is responsible for

A

securing the targeted environment and keeping the red team out by building, maintaining, and monitoring a comprehensive set of security controls.

21
Q

The white team

A

coordinates the exercise and serves as referees, arbitrating disputes between the team, maintaining the technical environment, and monitoring the results.

22
Q

Operational security controls are practices and procedures that bolster cybersecurity.

A

A penetration test is an example of operational security control.

23
Q

Encryption software, network firewalls, and antivirus software are all examples of

A

technical security controls.