N2K - Flash Cards - General Security Concepts - Summarize Fundamental Security Concepts

1
Q

In the data plane, what term refers to entities requesting access to resources?

A

Subject/System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of security mechanism lures attackers by simulating valuable files?

A

Honeyfile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of threat scope reduction?

A

To minimize the potential impact of security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a network of decoy systems designed to detect and observe malicious activity?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which control plane component evaluates and enforces security policies in real-time?

A

Policy Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of sensor detects motion by emitting microwave signals and analyzing reflections?

A

Microwave Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of sensor triggers alarms upon detecting changes such as footsteps?

A

Pressure Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of sensor detects heat signatures to identify potential threats?

A

Infrared Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access control method enforces rules based on predefined policies?

A

Policy-Driven Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the control plane, who is responsible for creating and managing security policies within an organization?

A

Policy Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which data plane component enforces access control policies at the network perimeter?

A

Policy Enforcement Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which environmental security measure illuminates areas to deter intruders?

A

Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which logical part of a network architecture processes and forwards user traffic?

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a bollard?

A

A bollard is a physical security control that prevents cars from accessing certain areas. They are most often deployed in front of retail storefronts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which logical component of a network architecture manages traffic forwarding decisions?

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a honeypot?

A

A decoy system in your network installed to lure potential intruders away from legitimate systems

17
Q

What is an access control vestibule?

A

Also called a mantrap, it is a door system that allows for someone to be physically identified prior to entering the facility.

18
Q

Which category of controls includes controlling access to different parts of a building, implementing locking systems, installing fencing, implementing environmental controls, and protecting the facility perimeter?

A

Physical Controls

19
Q

Which security model assumes no trust, even within internal networks?

A

Zero Trust

20
Q

Which security concept adjusts user privileges dynamically based ontheir behavior, their connecting devices, and/or their location?

A

Adaptive Identity

21
Q

Which physical credential grants entry to secure areas?

A

Access Badge

22
Q

Which security concept assumes all network traffic in a particular segment is trusted by default?

A

Implicit Trust Zones

23
Q

Which type of sensor uses high-frequency sound waves to detect movement or presence?

A

Ultrasonic Sensors

24
Q

Which security concept ensures that a sender cannot deny the authenticity or integrity of a message?

A

Non-Repudiation

25
Q

Which physical security measure involves human presence to monitor and respond to threats?

A

Security Guard

26
Q

What is the term for a server that has been configured specifically to distract an attacker from production systems?

A

Honeypot

27
Q

Which physical security measure uses cameras to monitor and record activities?

A

Video Surveillance

28
Q

What are the two planes of responsibility in zero trust?

A

Control plane and data plane

29
Q

Which assessment method identifies discrepancies between the current and the desired security states?

A

Gap Analysis

30
Q

Which concept provides the proof of origin of data, preventing the sender from claiming they were not the one who sent it?

A

Non-Repudiation

31
Q

What is a honeynet?

A

When two or more honeypots are implemented on a network