Section 4.1 Flashcards

1
Q

What does CIA stand for?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality

A

Information is kept safe from unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity

A

Information is true and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Availability

A

Information is accessible at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you maintain Confidentiality?

A

Encryption, Access Controls, and Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you maintain Integrity?

A

Hashing, Digital signatures (encrypting hash with private key), and Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you maintain Availability?

A

Redundancies, Load Balancing, Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Zero Trust

A

It means that no one is trusted by default from inside or outside the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Threat?

A

A person or thing that could take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Vulnerability?

A

A weakness in a system or a network that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Exploit?

A

When a threat takes advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is RBAC?

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Defense in Depth?

A

The utilization of multiple methods and layers of defense to minimize attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Separation of Duties?

A

No one person has all of the access or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can a switch be protected from anyone simply plugging into it to gain access to the network?

A

Three methods exist:
1) NAC requires anyone who plugs in to authenticate.
2) Administrator can disable the actual port that’s not in use.
3) Use MAC address validation to filter duplicate and spoofed MAC addressses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does NAC stand for and what does it do?

A

Network Access Control
Requires authentication when plugging into a switch

17
Q

How does authentication happen?

A

It can happen locally on the device such as a router, or it can be on a separate authentication server.

18
Q

What are the common remote authentication protocols?

A

RADIUS, TACACS+, LDAP, Kerberos

19
Q

What is the advantage of using Kerberos vs the other authentication protocols?

A

You only need to authenticate once with SSO (Single Sign On)