SEC+ Flashcards
What are the Two types of commonly referenced network security?
- Information Security
- Information Systems Security
What are the The CIA Triad + two?
Confidentiality, Integrity, Availability, + Authentication & Non-repudiation
What is the AAA of Radius?
Authentication, Accounting, and Authorization
What measures or mechanisms are put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data?
Security Controls
What are the four categories that Security Controls are grouped with?
1.Technical
2.Managerial
3.Operational
4.Physical
What are the six different types of security controls?
1.Preventative
2.Detective
3.Compensation
4.Deterrent
5.Corrective
6.Directive
What is the security model that operates on the principle that no one, whether inside or outside the organization should be trusted by default?
Zero Trust
What plane consists of the adaptive identity, threat scope reduction, policy-driven access control, and secured zones?
Control Plane
What plane is focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points?
Data Plane
What is considered a threat in Cyber security?
Anything that can cause harm, loss, damage, or compromise IT systems
Finding different ways to minimize the likelihood of an outcome occurring and achieving the desired outcomes is referred to as ___________.
Risk Management
What two conditions must exist at the same time to be considered a RISK?
Threat and Vulnerability
What element of backup strategy involves making data copies regularly at set intervals?
Frequency
When a tech company wants to partner with a vendor, what should they look for to verify security is met to their internal cyber security standards?
Evidence of internal audits
What encryption standard uses one key to encrypt and decrypt?
Symmetric encryption
Symmetric encryption is also called ______.
Secret Key
What is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm?
Key exchange
What encryption standard uses two keys instead of one?
Asymmetric encryption
What is the process of using a public key from a public/private key pair to encrypt plaintext, and then using the corresponding private key to decrypt the ciphertext?
Asymmetric encryption
What does DAC stand for?
Discretionary access control
What is Discretionary access control (DAC)?
is an authorization model where the owner of the resource decides who is allowed to access it.
What does MAC stand for?
Mandatory Access Control
What is Mandatory Access Control (MAC) for?
is an authorization model where access to resources is determined by a set of rules defined by a central authority.
Where is MAC most commonly used?
Large organizations, government and military settings