LP - Security Goals and Controls Flashcards

Security Goals and Controls

1
Q

CIA Triad stands for

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII stands for

A

Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PHI stands for

A

Personal health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

High availability is a

A

failover feature to ensure availability during interruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA stands for

A

Authentication, Authorization, and Accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Character mode in AAA is

A

keystrokes and commands sent for configuration or administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet (or network) mode occures when the

A

network device serves as an authentication proxy on behalf of services in other networks eg web, FTP, DNS, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In authentication the three way handshake should be done

A

after the authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting is generally implement for two use cases they are

A
  • Monitoring, visibility and reporting
  • Billing, chargeback, and reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RADIUS is used for accounting and is based on what service

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Endpoint (or device) Authentication is a security technique to ensure only

A

authorized devices can connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NPE’s are what?

A

Non-person entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Endpoint management is also used in

A

M2M (machine to machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Some endpoint authentication methods (5) are

A
  • shared secret key
  • X.509 v3 device certificate
  • cryptographic key, certificate or other credential stored on the hardware
  • Hardware security module (HSM)
  • Protected access file (PAC) in a Cisco system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authorization Model DAC stands for

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAC has fine grained control over access but it can result in

A

inconsistent access control decisions

16
Q

Authorization Model DAC is prone to

A

privilege creep

17
Q

Authorization Model RBAC stands for

A

Role-based access control

18
Q

Authorization Model MAC stands for

A

Mandatory access control

19
Q

Mandatory access control (MAC) is a strict maths model where access is determined by the system based on

A

predefined security labels and rules

20
Q

Principals in the MAC model are assigned

A

Security clearences or classification levels

21
Q

Resource objects in the MAC model are labeled with

A

Sensitivity levels

22
Q

Access in the MAC model is granted or denied by

A

comparing the security clearences or classification levels with the sensitivity levels

23
Q

The MAC model discretionary or non-discretionary

A

non-discretionary

24
Q

Authorization Model ABAC stands for

A

Attribute-based access control

25
Q

Authorization Model ABDAC stand for

A

attribute-based dynamic access control

26
Q

UBA stands for

A

user behavioural analytics

27
Q

Authorization Model Rule-based access contol has the same acrynom as

A

role-based access control