Security+ Flashcards

sec +

1
Q

what do the terms PII PHI and IP stand for in regards to confidentiality

A

Personally identifying information, Personal health information, Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the three components of the CIA triad

A

Confidentiality, Integrity, Availibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is non-repudiation

A

non repudiation is the enforcement of the inability for a subject to deny they took part in an agreement or contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AAA

A

Authentication, Authorisation, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is Character mode

A

character mode sends keystrokes or commands to a network admission device for the purpse of configuration or administration on that same device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Packet or network mode

A

packet/network mode occurs when the network admission device servs as an authentication proxy on behalf of the services in other networks such as web,ftp,dns etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 4 common device authentication methods

A

a shared secret key stored on endpoints.
an X.509 V3 device certificate stored in a software application.
a cryptographic key , cert or other credential stored at hardware level in a tpm.
a key stored in a Hardware security module HSM.
a Protected Access File PAC file in a EAP-FAST network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is DAC

A

dac is discretionary access control, DAC grants accces to the resource decisions to the owners and custodians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is RBAC

A

RBAC is role based access control

in which access is granted based on job title, users gain rights based on their roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is MAC in terms of authorisation models

A

Mandatory access control is a strict mathematical model in which access to a resource is determined by the system based on predefined security labels and rules, principals are assigned security clearences such as top secret,classified etc
resource objects are labled with sensitivity levels
access is granted or denied by comparing these labels and rules, ensuring strict control and preventing unauthorized access
this is a non-discretionary model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is ABAC

A

ABAC is attribute based access control, abac uses combination of characteristics associated with user such as job role, use of vpn, sensitvity level, time of access etc

authorisation policies are defined using these combinations and decisions made based on evaluating the attibutes against defined policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is ABDAC

A

ABDAC is the combination of DAC and ABAC Attribute based dynamic access control, considers factors such as risk assement, user attributes and resource attributes and contextual information to make access control decisions in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the 4 main security control categories

A

Technical, Physical, Managerial and Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the 6 main security control categories

A

Preventative, deterrent
Detective, corrective
compensating, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is gap analysis

A

gap analysis is the process of analysing the current stat and where you would like the business to be in regards to it security it could be applied to projects, plans and initiatives throught an entire career

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are some common security gaps

A

weak/shared creds

lack of tested patch management

violation of tested patch management

no/unenforced AUP

poor physical security

config and deployment errors due to lack of

change and config management
lack of proper auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is ZT

A

Zero Trust
a term for an evolving set of cybsec intiatives that move away from static network based perimeters
ZT assumes there is no implicit trust granted to assets based purely on network/physical location or asset ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SIEM

A

Security Information and Event Management

SIEM systems give security teams a more holistic look at who is trying to gain access to their systems at any point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is SOAR

A

Security orchestration, automation, and response
refers to a set of tools and services which automate cyberattack prevention and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the PDP

A

policy decision point
which is contained in the ZT control data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is the PE

A

Policy Engine
uses enterprise policy driven access control to grant/deny or revoke access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is the PA

A

Policy Administrator
the PA enables/disables the communications path between a subject and a resource via commands to associated policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is PEP

A

Policy enforcement point
a device such as switch which forwards info to the policy data plane to then be verified and then the information can leave as trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the 2 main types of PEPs

A

Network PEPs
-edge routers
-edge firewall appliances
-SDP gateways
-Network L2/ML switches
-Authentication proxy servers

Application PEPs
-API gateways
-Resource groups
-Network VLANS
-Code repositories
-trusted cloud services

25
Q

how many classes of gate are there

A

4

26
Q

what are the 6 stages of change management lifecycle

A

1.Submitting
2.Approving
3.Documenting
4. Testing
5.Implementing
6.Reporting

27
Q

what are the 2 types of control used to describe allow/deny lists

A

Allow - permissive control
Deny - Restrictive control

28
Q

what is a CMDB

A

configuration management database, the database in which a well established tagging and labelling schema maps to

29
Q

what is a CMS

A

config management system

30
Q

what are the 2 main types of cryptography

A

Symmetric and Asymetric

31
Q

what are some benefits of symmetric key cryptosystems

A

same key to encrypt and decrypt

efficient, fast and handles high data rates of throughput

computationally inexpensive

deploys shorter key lengths (40-512bits)

32
Q

what are some disadvantages of Symmetric keys

A

keys under 128 bits are easily cracked

key management is more complex unless using Hardware security modules (HSMs) or cloud management services

symmetric systems do not scale well unless cloud managed
populare algorithms are AES-CBC-128/256 and AES-GCM-128/256

33
Q

what are the 2 types of ciphers in symmetric key systems

A

Block cipher
-operates on fixed blocks of data based on key size eg 64/128/256
-Messages bigger than the key size must be broken into blocks the size of the key and must include padding
common block ciphers :
DES (mostly deprecated)
3DES-EDE (mostly deprecated)
AES-CBC
AES-GCM
Blowfish

  1. Stream Ciphers
    operate on a continuous stream of plaintext data by encrypting one bit or byte at a time
    plaintext bits are typically XORed with keystream bits
    keystream = random bits, bytes, numbers, characters
    Faster and less complex than block ciphers
    examples of stream ciphers are
    FISH
    CryptMT
    Scream
    Cryptographic hashing
34
Q

what are some advantages of Asymmetric key systems

A

uses a mathematically related pair of public and private key

PKI enables efficient key management and scalability

often used for digital signatures and key exchange

employs longer key length, up to 4096

35
Q

what are some popular asymmetric algorithms

A

RSA (Rivest-Shamir-Adleman) is the most widely used algorithm for securing data communication and data encryption

Diffie-Hellman key exchange - a protocol for securely exchanging cryptographic keys over an untrusted network

ECC elliptic curve cryptography - an algorithm based on the algebraic structure of elliptic curves over finite fields

DSA digital signature algorithm - a standard based on the mathematical concept of modular exponentiation and discrete logarithm problems

you can do dsa in ecc called eccdsa

36
Q

what is FDE and MBR

A

Full disk encryption, the process of encrypting all user data on a device

Master boot record, includes code that loads the operating system , this is not encrypted

37
Q

what are the main levels of encryption

A

Full disk
partition
file
Volume/block
Database / record

38
Q

what is hashing

A

a one way mathematical function that produces a digest of 128-512 bits

converts data of virtually any size into a fixed length string called a hash value, message digest, or fingerprint

essentially an advanced version of a simple checksum

subject to the birthday paradox and avalanche effect

must be collision resistant so no 2 seperate inputs can create the same hash, this is why MD5 was phased out

39
Q

what are some common hash functions

A

RIPEMD - 128/160/256/320 bit versions
SHA1 -160 bit
SHA2 - SHA256 or SHA512
SHA3 - 224-512
Whirlpool - modified AES

40
Q

what is Salting

A

salting is the technique of adding pseudorandom data to a hash function to make it less deterministic for cracking tools such as rainbow tables

2 weaknesses would be salts that are too short or arent unique for each password

41
Q

what is a HMAC

A

Has based message authentication codes
used for integrity and origin authentication

42
Q

what is DHKE

A

Diffie-Hellman key exchange
used to establish secret keys between 2 parties over an unsecure channel

used in SSH2, TLS and IPsec

cannot sign public key certs whereas RSA can

43
Q

what are the different types of DH

A

DH - same shared secret used all the time
DHE/EDH - different shared secret is used each time between parties
ECDH - uses EC public / private key pair, same shared secret used all the time between parties
ECDHE/ECEDH - uses public/private key pair, different shared secret used each session

44
Q

what is ECDHE/ECEDH

A

Elliptic curve diffie-hellman ephemeral

based on rich math functions of values plotted on an elliptic curve

uses smaller keyspaces while offering superior strength

256 bit elliptic key = 3072 bit standard key

good for mobile devices and IoT with limited memory and processing power

45
Q

which algorithms are used for hashing and which are used for signing typically

A

SHA1/2/3 for hashing
RSA, DSA,ECDSA for signing

46
Q

what are some common characteristics of structured attacks

A

-planned
-organised
-Persistent
-Multi phased
- internal or external
- commonly use exploit kits, zero days, modules and ransomeware

47
Q

what are some common characteristics of non-structured attacks

A

-accidental
-non malicious
- drive by web-surfing
-no AUP
-email
-usb and personal devices
- usually internal

48
Q

what is a script kiddy

A

inexperienced hackers who use pre-packaged script viruses or MaaS
Most commonly spread by email

49
Q

what is shellcode

A

small stubs of code used as a payload

50
Q

what is a dll

A

dynamic link library is a shared library of functions that multiple programs can access

51
Q

what are the treacherous 12

A

-data breaches
-weak creds and access management
-insecure apis
-system and application vulnerabilities
-account hijacking
-malicious insiders
-advanced persistent threats
-data loss
-insufficient due diligence
-abuse and nefarious use of cloud services
-DOS
-Shared tech vulnerabilities

52
Q

what is sdn

A

Software defined networking

53
Q

what is twofish

A

symmetric key block cipher block size 128 to 256 bits, does not provide full disk encryption

54
Q

what is GPG

A

GNU Privacy Guard, an alternative to Pretty Good Privacy (PGP) provides privacy and authentication, usually used to sign, encrypt and decrypt files/emails/whole disk partitions GPG is free alternative to PGP. does not need a hardware chip

55
Q

what is RipeMD

A

a 160 bit message digest encryption method comes in 128, 256 and 320 bit versions named RipeMd-128/256/320 respectively

56
Q

what is PAP

A

Password authentication protocol, users username and pw are sent to table which is encrypted to provide auth

57
Q

what is paralell processing

A

parallel processing is the testing of abilities to handle increased workload by simultaneously initiating multiple tasks and testing the systems ability to cope
it also helps ensure redundancy is built into the system

58
Q

what are 2 protocols that can be used to make a vpn connection

A

PPTP and LT2P
point to point tunneling protocol and layer2 tunneling protocol

59
Q
A