Section 4.1 Flashcards

1
Q

What does CIA stand for?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Information is kept safe from unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity

A

Information is true and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability

A

Information is accessible at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you maintain Confidentiality?

A

encryption
access controls
authentication
network security
physical security
steganography
training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you maintain Integrity?

A

hashing
digital signatures
certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you maintain Availability?

A

Redundancies, Load Balancing, Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Zero Trust

A

no user is trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat?

A

A person or thing that could take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Vulnerability?

A

A weakness in a system or a network that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Exploit?

A

When a threat takes advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Defense in Depth?

A

The utilization of multiple methods and layers of defense to minimize attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Separation of Duties?

A

No one person has all of the access or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 3 way to protect a network interface?

A

port security (MAC address filtering)
802.1X (NAC) which requires authentication
manual deactivation of port by administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does NAC stand for and what does it do?

A

Network Access Control
Requires authentication when plugging into a switch

17
Q

Where does authentication take place?

A

locally or separate authentication server.

18
Q

What are the common remote authentication protocols?

A

RADIUS, TACACS+, LDAP, Kerberos

19
Q

What is the advantage of using Kerberos vs the other authentication protocols?

A

allows Single Sign On (SSO)

20
Q

CVE

A

Common Vulnerabilities and Exposures

21
Q

What are CVEs?

A

documented and cataloged vulnerabilities in software and hardware

22
Q

CIA

A

Confidentiality, Integrity, Availability

23
Q

What is Least Privilege?

A

users have minimum access necessary to perform their job

24
Q

What’s the IEEE standard for NAC?

A

802.1X

25
Q

What’s another name for DMZ?

A

Perimeter Network

26
Q

What is the Perimeter Network?

A

the network between the internet and the internal network

27
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

28
Q

Between RADIUS and TACACS+, which provides granular control over what users can do?

A

TACACS+

29
Q

EAP

A

Extensible Authentication Protocol

30
Q

What’s TACACS+ commonly used for?

A

network device management

31
Q

What is RADIUS commonly used for?

A

network access

32
Q

What is LDAP commonly used for?

A

authentication and directory management

33
Q

What is Kerberos?

A

ticket based authentication

34
Q

SSO

A

Single Sign On

35
Q

What does EAP do?

A

connects the client to the authentication server/protocol

36
Q

What’s the goal of a Business Risk Assessment?

A

to identify potential risks and to implement strategies to mitigate them

37
Q

What’s the goal of a Vendor Assessment?

A

to evaluate the security and reliability of a 3rd party

38
Q

What’s the goal of a Process Assessment?

A

to ensure that internal processes are secure and efficient