MUST STUDY Flashcards
Explain MOA
Memorandum of Agreement is a formal document where both sides agree to a broad set of goals and objectives associated with the partnership.
Explain SLA
Service Level Agreement is commonly provided as a formal contract between two parties that documents the minimum terms for service provided. The SLA often provides very specific requirements and expectations between both parties.
Explain SCADA
Supervisory Control and Data Acquisition is a system used to control and monitor industrial processes. It’s like a brain for a large and complex system for industries like power plants, water treatment facilities, manufacturing plants and more.
The hardening process for an industrial SCADA system includes network segmentation, additional firewall controls and the implementation of access control lists.
Explain brute force attacks
Brute force attacks discover passwords by attempting to guess the password. brute force attacks usually attempt hundreds of passwords to guess the right one.
Explain spraying attacks
Spraying attacks is similar to brute force attacks, but it limits the number of password attempts in order to not alert the administrator or cause account lockout.
Explain downgrade attacks
A downgrade attack is often used to force an insecure encryption algorithm or the disabling of encryption entirely
Explain Zero Trust model
Zero trust describes a model where nothings is inherently trusted and everything must be verified to gain access. A central policy enforcement point is commonly used to implement a zero trust architecture.
Explain PKI
Public Key Infrastructure uses public and private keys to provide confidentiality and integrity. Asymmetric encryption and digital signatures are used as foundational technologies in PKI.
What kind of key would be put into key escrow and why?
A private key would be placed in key escrow as a backup method. Since in asymmetric encryption , the private key is used to decrypt information, then it is very important to have a backup of this key.
Explain SCAP
Security Content Automation Protocol focuses on the standardization of vulnerability management across multiple security tools. This allows different tools to identify and act on the same security criteria.
Explain Trojan Horse attacks
Trojan Horse attacks are usually disguised as legitimate software, the victim often doesn’t realize they’re installing malware. Once the trojan is installed, the attacker can install additional software to control the infected system.
Explain Replay Attack
A Replay attack is often used by an attacker to gain access to a service through the use of credentials gathered from a previous authentication. Internal devices communicating to an external servicer is not a common pattern for a replay attack.
Explain Keylogger Attack
A keylogger captures keystrokes and occasionally transmits (send the information to external server) this information to the attacker for analysis.
Explain SPF record
SPF record is used to publish a list of all authorized email servers for a specific domain
Explain DKIM
DKIM is used to publish the public key used for the digital signature for all outgoing email
Explain DMARC
DMARC record announces the preferred email disposition if a message is identified as spam. DMARC options include accepting the messages, sending them to a spam folder, or simply rejecting the emails.
What is a downside of allowing mobile devices inside a facility?
The exfiltration of confidential information and intellectual property is relatively simple with an easily transportable mobile device. Organizations associated with sensitive products or services must always be aware of the potential for information leaks using files, photos and video.
Explain key exchange algorithm
A key exchange algorithm can be used to securely exchange key information between devices, but it does not provide a method of encrypting data.
Explain Asymmetric encryption
Asymmetric encryption uses a recipient’s public key to encrypt data, and this data can only be decrypted with the recipients private key.
Explain Jump Servers
A jump server is a highly secured device commonly used to access secure areas of another network.
Explain NAC
Network Access Control is a broad term describing access control based on a health check or posture assessment. NAC will deny access to devices that don’t meet the minimum security requirements.
Explain air gap
Air gap is a segmentation strategy that separates devices or networks by physically disconnecting them from each other.
Explain Risk Acceptance
Risk acceptance is a business decision that places the responsibility of the risky activity on the organization itself. For example, if you were using cybersecurity insurance but decide to remove it due to its cost, then you are accepting the risk that comes with being responsible for the cybersecurity effects in your organization.