Security Flashcards

1
Q

What is Triple A?

A

Conceptual securiy model
- Authentication
- Authorization
- Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Authentication?

A

Verifying who a user claims to be.
May use separate credentials or a centralized storage system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Authorization?

A

Establishing and enforcing rules for who is permitted to access what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Accounting?

A

Recording each attempt to authenticate or authorize a user.
Informtion often used for auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CIA(NA)?

A

Another conceptual model for security
- Confidentiality
- Integrity
- Availibility
- Non-repudiation
- Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

Using a cipher (computer program) to convert plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is decryption?

A

Reverses encryption (ciphertext to plaintext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a key?

A

A long string of bits used to encrypt or decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain symmetric key encryption?

A

A shared key is used to encrypt AND decrypt plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain asymmetric key encryption?

A

Each user has their own pair of keys:
public key - shared with public
private key - only user has access
ONE key is used for encrypt and the OTHER is used to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a message digest?

A

A unique identified for a message created using a hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital signature?

A

An encrypted message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a digital certificate?

A

Certifies that a digital signature is authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Public Key Infrastructure?

A

The tools used to create and manage key certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN?

A

Uses encryption to extend an enterprise network onto the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are flows?

A

Collections of packets sent between two specific hosts

17
Q

What are rules?

A

Identifies the host involved in a flow, the protocols used, and determines if the flow is allowed or not

18
Q

What is a firewall?

A

A router configured to enforce rules

19
Q

What is a DMZ?

A

Additional network managed by an enterprise used to separate devices that may receive external flows

20
Q

Why use a DMZ?

A

Simplifies firewall rules

21
Q

What is an IDS?

A

Monitors a network switch for unusual behavior

22
Q

Explain the client-server model

A
  • Web servers store resources
  • Web clients request resources and render them
23
Q

What is a protocol?

A

Common language between two programs

24
Q

What is HTTP?

A

Protocol used between web servers and browsers

25
Q

Examples of static web resources?

A

HTML, CSS docs, images

26
Q

What are dynamically generated web resources?

A

programming instructions executed on a server host

27
Q

What are dynamic web resources?

A

programming instructions included in HTTP response for browser to execute

28
Q

What does a browser consist of?

A
  • rendering engine
  • JavaScript engine
  • environment where JS can execute
29
Q

What is Just-in-Time complilation?

A

compilation during program execution rather than before

30
Q

Provide a layered view of the web

A
  • Content
  • Structure: organizes content
  • Presentation: formats organized content
  • Behavior: enhances user interactions
31
Q

What is JavaScript?

A

programming language used to provide browser’s behavioral instructions