Sec+ Unknown terms Flashcards

1
Q

What is Degaussing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the components of WPA 1, 2, and 3?

A

WPA3 implements saw simultaneous authentication of equals. Stronger than passwords or pass phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain API Keys

A

Keys which Allow individual customers authenticate to the API service. Can be disabled if customer causes issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Kerberos? Explain

A
  • ## Authentication protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is 802.11i? Explain.

A
  • Security standard used within WPA2 and WPA3
  • not for device authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is CHAP? Explain

A
  • Stands for Challenge Handshake Authentication Protocol
  • not best choice for device authentication.
  • Periodically re-authenticates user.
  • Stops Session Hijacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 802.1x? Explain

A
  • Protocol frequently used to authenticate devices.
  • IEEE standard for port based network access control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CCMP? Explain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is WEP? Explain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Infrared? Explain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is WPA2? Explain

A
  • Wireless Network Protocol
  • Uses AES-based CCMP for network encryption
  • Counter Mode Block Chaining Message Authentication (CBC-MAC) Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DHCP? Explain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IMAP? Explain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SNMPv3? Explain

A

(Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is LDAP? Explain

A

Lightweight Directory Access Protocol
- lists all network resources
- can be secured with TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RADIUS? Explain

A

( )
- Remote Access Protocol
- does not handle authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is NTLM. Explain

A

(New Technology Lan Manager)
- Not XML based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is OAuth? Explain

A

Allows user’s information to be used by 3rd party services without revealing users password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is SAML? Explain

A

(Security Assertion Markup Language)
- XML Based standard for exchanging authentication and authorization data between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is PAP? Explain

A

(Password Authentication Protocol)
- Does not stop session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is TACACS+? Explain

A
  • Does not stop session hijacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is OPAL? Explain

A

Standard for specifying how to protect confidentiality for stored user data and how storage devices from storage manufacturers can work together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is UEFI? Explain

A

(Unified Extensible Firmware Interface)
- checks binaries during boot process to make sure hashes are valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is FUZZ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Storm Control?

A
  • limits the bandwidth used by broadcast packets that could potentially take down a network.
26
Q

What is Man-In-Browser attack? Explain

A
27
Q

What is DNS Poisoning?

A
28
Q

What is Typo Squatting?

A
29
Q

What is Snarfing? Explain

A
30
Q

What is SMTP? Explain? What port does it use?

A

(Simple Mail Transfer Protocol)
- Vulnerable to open access attacks.
- mitigate attacks by close relays open to the public. Or require username and password for authorization.

31
Q

What is PEAP? Explain

A
32
Q

What is LEAP? Explain

A
33
Q

What is an IV Attack! Explain

A

(Wireless Attack)
When an attacker observes the operation of a cipher using several keys and finds a mathematical relationship between those keys. Leads to decryption of data

34
Q

What is Enumeration? Explain

A

Enumeration is the process of determining and defining a list of attack vectors on a computer, such as a list of open ports. The attacker can use this list to determine the best method of attack.

35
Q

PAM?

A

Privilege Access Management

36
Q

What is Load balancing and its forms? Explain.

A
37
Q

What is Salting? Explain

A
38
Q

What is Tokenization?

A

Tokenization allows for sensitive data to be stored at a token service provider instead of being stored locally. The locally-stored token can be replaced with the real value when needed.

39
Q

Jack is following the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). He has finished the preparation and categorization steps. Which is the next step in the risk management framework?

A
  1. Prepare
  2. Categorize system
  3. Select controls
  4. Implement controls
  5. Assess controls
  6. Authorize system
  7. Monitor controls
40
Q

Standard for Attestation Engagements (SSAE) SOC 2?

A

SOC 2 engagement assesses the security and privacy controls that are in place

41
Q

Standard for Attestation Engagements (SSAE) SOC 1?

A

report assesses the controls that impact the accuracy of financial reporting

42
Q

Standard for Attestation Engagements (SSAE) Type 1?

A

reports a review auditor’s opinion of the description provided by management about the suitability of the controls as designed. They do not look at the actual operating effectiveness of the controls.

43
Q

Standard for Attestation Engagements (SSAE) Type 2?

A

report provides information on the auditor’s assessment of the effectiveness of the controls that are in place

44
Q

ISO 27002

A

ISO 27002 is an international standard for implementing and maintaining information security systems.

45
Q

ISO 27017

A

ISO 27017 is an international standard for cloud security;

46
Q

NIST 800-12

A

NIST 800-12 is a general security standard and it is a U.S. standard, not an international one

47
Q

NIST 800-14

A

NIST 800-14 is a standard for policy development, and it is also a U.S. standard, not an international one.

48
Q

ALE (annual loss expectancy?

A

SLE (single loss expectancy) × ARO (annualized rate of occurrence).

49
Q

RPO

A

RPO (recovery point objective) specifies the allowable data loss. It is the amount of time that can pass during an interruption before the quantity of data lost during that period surpasses business continuity planning’s maximum acceptable threshold.

50
Q

MTBF

A

MTBF (mean time between failures) is the rating on a device or component that predicts the expected time between failures.

51
Q

MTTR

A

MTTR (mean time to repair) is the average time it takes for a failed device or component to be repaired or replaced.

52
Q

ARO

A

ARO (annual rate of occurrence) is the ratio of an estimated possibility that a threat will take place within a one-year time frame.

53
Q

PPTP? Explain

A

Point-to-point tunneling protocol (PPTP) is a protocol used in VPNs. It encapsulates PPP packets, ultimately sending encrypted traffic. PPP is used for dial-up connections, but it’s not suitable for VPN without PPTP.

54
Q

Kerberos is a widely used network authentication mechanism and is used in Windows Active Directory domains and some Unix environments. When implemented in an environment, it has several requirements in order to operate optimally and provide a secure authentication process.

A

Kerberos provides mutual authentication, which assists in the prevention of man-in-the-middle attacks and uses tickets in order to avert replay attacks. When a user logs on with Kerberos, the key distribution center (KDC) issues a ticket that will last for 10 hours before it expires. This relies on a method of issuing tickets for authentication, which is handled by the KDC. It also requires time synchronization because of the timestamps applied to the communications and tickets. Finally, it requires a database that houses the various objects representing the users or subjects.

55
Q

ESP

A

ESP - The Encapsulating Security Payload (ESP) protocol provides all three security services: authentication, integrity, and confidentiality. It can encrypt the header of packets while in tunnel mode for VPNs, while not encrypting the header in transit mode for local networks.

56
Q

IKE

A
57
Q

L2TP

A
58
Q

AH

A
59
Q

Explain a PKI Infrastructure

A
60
Q

What is isolation?

A
61
Q

What is segmentation?

A
62
Q

What is containment?

A