Section 4.1 Flashcards

1
Q

What does CIA stand for?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Information is kept safe from unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity

A

Information is true and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability

A

Information is accessible at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you maintain Confidentiality?

A

encryption
access controls
authentication
network security
physical security
steganography
training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you maintain Integrity?

A

hashing
digital signatures
certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you maintain Availability?

A

Redundancies, Load Balancing, Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Zero Trust

A

no user is trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat?

A

A person or thing that could take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Vulnerability?

A

A weakness in a system or a network that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Exploit?

A

When a threat takes advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Defense in Depth?

A

The utilization of multiple methods and layers of defense to minimize attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Separation of Duties?

A

No one person has all of the access or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 3 way to protect a network interface?

A

port security (MAC address filtering)
802.1X (NAC) which requires authentication
manual deactivation of port by administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does NAC stand for and what does it do?

A

Network Access Control
Requires authentication when plugging into a switch

17
Q

Where does authentication take place?

A

locally or separate authentication server.

18
Q

What are the common remote authentication protocols?

A

RADIUS, TACACS+, LDAP, Kerberos

19
Q

What is the advantage of using Kerberos vs the other authentication protocols?

A

allows Single Sign On (SSO)

20
Q

CVE

A

Common Vulnerabilities and Exposures

21
Q

What are CVEs?

A

documented and cataloged vulnerabilities in software and hardware

22
Q

CIA

A

Confidentiality, Integrity, Availability

23
Q

What is Least Privilege?

A

users have minimum access necessary to perform their job

24
Q

What’s the IEEE standard for NAC?

25
What's another name for DMZ?
Perimeter Network
26
What is the Perimeter Network?
the network between the internet and the internal network
27
TACACS+
Terminal Access Controller Access-Control System Plus
28
Between RADIUS and TACACS+, which provides granular control over what users can do?
TACACS+
29
EAP
Extensible Authentication Protocol
30
What's TACACS+ commonly used for?
network device management
31
What is RADIUS commonly used for?
network access
32
What is LDAP commonly used for?
authentication and directory management
33
What is Kerberos?
ticket based authentication
34
SSO
Single Sign On
35
What does EAP do?
connects the client to the authentication server/protocol
36
What's the goal of a Business Risk Assessment?
to identify potential risks and to implement strategies to mitigate them
37
What's the goal of a Vendor Assessment?
to evaluate the security and reliability of a 3rd party
38
What's the goal of a Process Assessment?
to ensure that internal processes are secure and efficient