Review Questions Flashcards
What is hashing in the context of cybersecurity?
The practice of transforming a given key or string of characters into another value for the purpose of security . (Think encryption)
What is “M of N” in context of key signing and cybersecurity?
M of N is multi-user access. (You need multiple people to gain access to something think multiple keycards for one door)
Does salting have to be kept secret in context of encryption and or password safety?
Salting does not have to kept secret.
What makes plaintext the most effective?
The length.
What does 3-factor authentication include?
The third factor is including some sort of bio-metrics. (Fingerprints, facial recognition)
When smart cards (key cards) are implemented in security what information is stored on the cards given to employees?
A private key
Does rule based access control include negotiation?
No it does not include negotiation
What security concept uses the idea of minimum permissions.
The concept of least privilege
Give a brief description of identity management.
Ensures that authorized people – and only authorized people – have access to the technology resources they need to perform their job functions
What is deprovisioning.
Removing a former employees access to software and network services.
What does LDAP stand for
Lightweight Directory Access Protocol
What is a distinguised name?
Describes the identifying information in a certificate
What is the Kerebos protocol used for?
A protocol for authenticating service requests between trusted hosts across an untrusted network
Should assets that require high confidentiality and high integrity have network access or connections.
There should be no network connections.
What is the Zero Trust framework.
Zero Trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network