Section 10 Flashcards

1
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a process that uses mathematical models to convert readable data( plaintext ) into an unreadable form ( ciphertext )

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a security mechanism that prevents an individual or entity from denying their participation in a transaction or communication

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be exchanged for 2 people to communicate ( hint keys )

A

Public Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

uses a public and private key

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Creates a fixed-sized hash value

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

used to verify data integrity

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 Common hashes

A

MD5 and SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

include something you know, have, or are

A

Authentication factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

include something you do, exhibit, know, or somewhere you are

A

Authentication attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a security strategy that limits the ability of resource owners to grant or deny access to file system objects (Top secret) (uses labels)

A

(MAC) Mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a cybersecurity model that allows the owner of a resource to control who has access to it and what level of access they have. ( Owner )

A

( DAC ) Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

restricts network access based on a person’s role within an organization and has become one of the main methods for advanced access control (Sales) (uses groups)

A

(RBAC) Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Uses UDP ports 1812-1813 or UDP 1645-1646

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provides AAA— Authentication, Authorization, and Accounting

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uses TCP port 49

A

TACACS+

17
Q

Designed to do authentications and authorization for local area networks

A

Kerberos

18
Q

What is EAP

A

Extension Authentication Protocol- allows transactional based authentication mechanisms to be able to talk to each other

19
Q

What is EAP PSK

A

EAP(pre-shared key) has a common key that everybody uses to log in

20
Q

What is PEAP

A

Protected Extensible Authentication Protocol- uses a standard username and password

21
Q

EAP MD5 uses…

A

Hash

22
Q

EAP-TLS is…

A

a single certificate which comes from the server side; then pass to individual clients

23
Q

EAP-TTLS is…

A

Requires both the individual clients and authenticating system to each have certificates

24
Q

Relies heavily on time stamps

A

Kerberos

25
Q

Uses Windows active Directory

A

LAN (Local Area Network)

26
Q

What is SAML

A

Security Assertion Markup Language- allows a single person to log in to a bunch of different devices; used to manage multiple apps using a single account

27
Q

What is PKI

A

Public Key Infrastructure- the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys.

28
Q
A