Review Flashcards

1
Q

To protect assets using Prevention, Detection, and recovery

A

The goal of cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication, Non-Repudiation, Confidentiality, and Integrity

A

The attributes/properties provided by cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anyplace entities with different privileges interact.

A

Trust boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A high level statement of what is, and what is not, allowed.

A

A security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity, confidentiality, and availability

A

The 3 pillars of cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A subset of substitution ciphers where a character is substituted for another one a certain characters away. Caesar for example

A

Shift cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security mechanisms are implemented, installed and administered correctly

A

One of the false assumptions of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Read, write and execute

A

The standard unix/ transactional permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user, process or program must be able to access ONLY the information and resources that are necessary for its legitimate purpose

A

The principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vertical and Horizontal

A

The two types of privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The practice of defending computers, servers, mobile devices… from malicious attacks. Also know as information technology or electronic information security

A

Cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The trustworthiness if data or resources. The knowledge that data has not been tampered or altered

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method, tool or procedure for enforcing a security policy

A

Security mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The concealment of information resources

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To transform or encipher a message or plaintext into ‘an intermediate form’ or ciphertext in which the original information is present but hidden

A

The goal of Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A detailed statement regarding the implementation of a security mechanism

A

A Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

38% of breaches were reportedly caused by thus type of vulnerability

A

Web Application Vulberability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Uses a single key for both encryption and decryption

A

Symmetric our secret key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exchange, Storage, and Use

A

The Key Factors of proper Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Revenge, Knowledge, Money, Entertainment, Ego and Cause

A

The 6 common goals/motivators of social engineering

21
Q

Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.

A

A Threat

22
Q

The practice of protecting as another person with the goal of obtaining information or access to a person, company or computer system

A

Impersonation

23
Q

The potential for loss, damage, or destruction of an asset as a result of a threat exploring a vulnerability

A

Risk

24
Q

The art or science of skillfully maneuvering human beings to take action in some aspect of their lives

A

Social engineering

25
Q

The unauthorized interception of information and is a form of disclosure

A

Snooping or eavesdropping

26
Q

A method of encryption where plaintext is shifted so that the ciphertext constitutes a permutation of the plaintext

A

A Transposition cipher

27
Q

A10 of the OWASP top 10. Warnings and errors generate no, inadequate or unclear log messages that are not properly reviewed

A

Insufficient logging and monitoring

28
Q

Any sequence of one or more symbols given meaning by specific act(s) of interpretation

A

Data

29
Q

Uses one key for encryption and another for decryption

A

Public key or asymmetric encryption

30
Q

Private, hybrid, public

A

Common deployment models for cloud computing

31
Q

Information that is protected against unwarranted disclosure and should be safeguarded

A

Sensitive data

32
Q

The process by which potential threats such as vulnerabilities or the absence of safeguards, can be identified, enumerated, and mitigation’s can be prioritized

A

Threat Modeling

33
Q

A global set of standards for internet security that are recognized best practices for securing IT systems and data against attacks

A

CIS controls and CIS benchmarks

34
Q

CIS =

A

Center for Internet Security

35
Q

To make software security visible, so that individuals and organizations are able to make informed decisions

A

The mission of OWASP

36
Q

Core, Tiers and profile

A

3 components of cyber security framework

37
Q

Not properly classifying and protecting important data leading to unauthorized access

A

Sensitive data exposure

38
Q

The individual responsible for monitoring and evaluating the effectiveness of all cyber security measures and processes

A

The CISO

39
Q

1XX indicates request received, 2 the action was successful, 3xx further action needs to be taken

A

Server response codes

40
Q

A5 of OWASP, acting as a user without being logged in or ascribe as admin when logged in as user

A

Broken access control

41
Q

Reflected, Stored, DOM

A

The types of xss

42
Q

Functions, categories, subcategories, and informative resources

A

The core of NIST cyber security framework

43
Q

The algorithm that succeeded Diffe-Hellman and is still used today for public key encryption

A

RSA

44
Q

When software constructs an SQL command using externally influenced input

A

SQL Injection

45
Q

Categories, Specialty areas, work roles, tasks, KSAs

A

What are the components of the NICE framework

46
Q

Snooping and eavesdropping is a form of

A

Disclosure

47
Q

The acceptance of false data is this type of threat category

A

Deception

48
Q

Permission validation and web session security occurs in the

A

Logic layer