Security+ Flashcards

1
Q

Symmetric Encryption

A

Single Key (Private Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

Two Keys (Public Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream Cipher

A

Bit-by-bit with XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Cipher

A

Block-by-block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES and 3DES

A

Old Symmetric Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDEA

A

Symmetric Block Cipher (Not Widely Used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES

A

Symmetric Block Cipher (Widely Used Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4, RC5, RC6

A

Symmetric Stream Cipher, used in SSL and WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diffie-Helman (DH)

A

Asymmetric and used for VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA

A

Asymmetric used for MFA and Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECC

A

Asymmetric used for Tablets/Mobile applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD5

A

Older Less Secure Hashing Algo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHA-1, SHA-2, SHA-3

A

More Secure Hashing Algo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RIPEMD

A

Hashing Algo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HMAC

A

Message Authentication Hashing Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Signature

A

Created by using hashing and encrypting with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PKI

A

Framework built on Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Certificate Authority (CA)

A

They issue digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Key Escrow

A

Keys stored in secure 3rd party location, in case keys are somehow lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Digital Certificate

A

digitally signed doc that binds a public key with a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Registration Authority (RA)

A

Digital Certs are requested from an RA which will pass on the info to the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TPM (Trusted Platform Module)

A

Hardware Encryption Solution (BitLocker) (Personal Vault)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HSM (Hardware Security Module)

A

Hardware Encryption Solution (Financial Transactions)(Compliance) (Big Bank Vault)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

KMS (Key Management System)

A

Big Daddy System that Generates, Distributes, manages, and deletes keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Secure Enclave
Separate fortress inside devices (fingerprints, apple pay, face id)
26
Steganography
Hidden data within pictures, etc
27
Tokenization
Substituting sensitive data elements with non-sensitive equivalents (tokens)
28
Downgrade Attack (Rollback attack)
An attack that forces a system to use an older encryption protocol to make it easier to crack
29
Collision Attack (Birthday Attack)
Attack that attempts to find 2 different inputs that generate the same hash output
30
Ad-Hoc vs One-Time Risk Assessments
Ad-Hoc - in response to specific event and may be repeated, One-Time - for specific event and are not repeated
31
RTO
Recovery Time Objective
32
RPO
Recovery Point Objective (maximum amount of data loss measured in time)
33
MTTR
Mean time to repair
34
MTBF
Mean time between failures
35
EF
Exposure Factor
36
SLE
Single Loss Expectancy
37
ARO
Annualized Rate of Occurence
38
ALE
Annualized Loss Expectancy
39
GRC
Governance, Risk Management, Compliance
40
DAC (Discretionary Access Control)
Owner decides who has access
41
MAC (Mandatory Access Control)
Uses labels to determine access - Often used in government/military settings
42
RBAC (Role-Based Access Controls)
Assigns access based on user roles
43
MDM (Mobile Device Management)
Mobile Device management system for all mobile devices in an org
44
RAID 0
Striping across 2 drives (Faster read/write) (no redundancy)
45
RAID 1
Mirroring (Complete copy of data)
46
RAID 5
Striping with parity (needs 3 drives)
47
RAID 6
Striping with double parity (needs 4 drives)
48
RAID 10
Combines RAID 1 and RAID 0
49
SDN (Software-Defined Network)
Made up of 3 parts: Data Plane, Control Plane, and Application Plane
50
FTP Port
TCP 20,21
51
SSH Port
TCP 22
52
Telnet Port
TCP 23
53
SMTP Port
TCP 25
54
TACACS+ Port
TCP 49
55
DNS Port
TCP/UDP 53
56
DHCP Port
UDP 67, 68
57
HTTP Port
TCP 80
58
Kerberos Port
TCP/UDP 88
59
LDAP Port
UDP 389
60
HTTPS Port
TCP 443
61
SSTP Port
TCP 443
62
LDAPS Port
TCP 636
63
RDP Port
TCP 3389
64
Layer 1
Physical
65
Layer 2
Data Link
66
Layer 3
Network
67
Layer 4
Transport
68
Layer 5
Session
69
Layer 6
Presentation
70
Layer 7
Application
71
NGFW
Next-Gen FireWall - (Layer 7 Firewall with added benefits)
72
UTM
Unified Threat Management Firewall (All in one hardware solution)
73
WAF
Web Application FW
74
Layer 4 Firewall
Port and Packet header info firewall
75
Layer 7 firewall
Application level firewall, much more in-depth that layer 4 firewall
76
ACL
Access Control List
77
IDS vs IPS
IDS just logs and alerts, IPS takes action
78
Proxy Server
A separate server that all traffic is routed through to increase privacy, security, and makes webpage retrieval faster due to its caching capabilities.
79
Jump Server
Used to RDP/SSH (remote) into an isolated server group. Usually highly protected and in DMZ. Admins use these to configure and manage isolated servers securely.
80
TACACS+
802.1x port authentication security (MAC address) solution, Used primarily for Cisco only solutions whereas RADIUS is a vendor neutral solution
81
RADIUS
802.1x port authentication security (MAC address) solution, Vendor neutral solution, whereas TACACS+ is primarily used with Cisco products
82
EAP
Extensible Authentication Protocol - used in conjunction with 802.1x for port auth security (MAC address)
83
SD-WAN
Software Defined Wide Area Network
84
SDN
Software Defined Network
85
SASE
Secure Access Server Edge, A SASE (secure access service edge) architecture combines networking and security as a service functions into a single cloud-delivered service at the network edge.
86
Screened Subnet
Basically new term for DMZ
87
LDAP
Lightweight Directory Access Protocol (Used in single sign on)
88
OAuth
Open Authorization (When you login to a site using Google account, you are using OAuth) (single sign on)
89
SAML
Used in single sign on
90
PAM
Privileged Access Management
91
IoC
Indicators of Compromise (Signs that potential malicious activity occurred)
92
Input Validation
Ensures applications only accept the right type of data (prevents against injection attacks)
93
NAC
Network Access Control, software or hardware, scans devices before allowing access to network
94
DKIM
DomainKeys Identified Mail, email security, prevents email spoofing etc
95
SPF
Sender Policy Framework - email authentication
96
DMARC
email security, works with DKIM
97
EDR
Endpoint Detection and Response, database tool that helps cybersecurity staff to monitor events and conduct investigations, similar to IDS/IPS
98
FIM
File Integrity Monitoring, checks core system files regularly to ensure they haven't been changed or tampered with
99
XDR
Extended Detection and Response, just like EDR but more comprehensive (email, cloud, network, etc)
100
UBA
User Behavior Analytics
101
Well Known Ports
0-1023
102
Registered Ports
1024-49151
103
Private Ports
49152-65535
104
Responsible Disclosure
When a vulnerability is found, you must reach out to the company and let them know about it so it can be patched, before going public with it
105
CVSS
Common Vulnerability Scoring System
106
CVE
Common Vulnerability and Exposures, A huge database with all the known vulnerabilities in the world and gives each one a number
107
Nessus
Vulnerability Scanner
108
OpenVAS
Vulnerability Scanner
109
SNMP
Simple Network Management Protocol, it collects and organizes info about managed devices on a network, and can modify info and managed devices, (Info center that collects and notifies on any changes or events that are occurring on the network)
110
SIEM
Security Information and Event Management, security solution that provides real-time analysis of security alerts that are generated by network hardware or software (Core hub to review events, logs, incidents)
111
Agent vs Agentless SIEM
Agent is installed directly to each pc/endpoint (More detailed, real-time, but more maintenance) Agentless doesnt require anything to be installed, uses SNMP (less detailed, near real-time, less maintenance)
112
Splunk
SIEM
113
DLP
Data Loss Prevention
114
SCAP
Security Content Automation Protocol, Standards used for compliance (Uses CVSS for scoring)
115
NetFlow
Flow Analysis tool that captures meta data on all packets crossing the network so we can use them to identify trends and potential threats
116
NIST 7 Step Incident Response Procedures
PDACERP, Prep, Detection, Analysis, Containment, Eradication, Recovery, Post
117
Journalctl
used to look at logs on linux machine
118
NXLog
Crossplatform tool to manage logs
119
NetFlow
Cisco Network traffic capture, general info, not full packet capture
120
SFlow
Open-source version of NetFlow
121
802.1X
802.1x is a standard developed by the IEEE to govern PORT-BASED network access.
122
DLP
Data Loss Prevention
123
CRL
Certificate Revocation List
124
DSA
Digital Signature Algorithm
125
AUP
Acceptable Use Policy
126
SPF
Sender Policy Framework (helps prevent email spoofing, defines which servers can send email on their behalf)
127
CSR
Certificate Signing Request
128
White Box Pen Test
Tester has all info about the server infrastructure prior to testing
129
Black Box Pen Test
Tester has no info at all prior to testing
130
Gray Box Pen Test
Tester has some info prior to testing
131
Phishing, vs Vishing, vs Smishing
Email, Voice, Text
132
IV
initialization vector (IV) is a random or unique number used in cryptography to ensure that the same plaintext encrypted multiple times will produce different ciphertexts
133
SOW
A statement of work specifies the detailed scope of work, tasks, deliverables, timelines, and costs for a specific project or engagement with the vendor.
134
MOA
A Memorandum of agreement (MOA) typically outlines a broader understanding or collaboration between parties, but it may not necessarily include specific services, timelines, and costs as in this context.
135
SLA
A Service-level agreement (SLA) is a specific type of agreement that defines the level of service expected from the vendor, including performance metrics, response times, and other service-related terms.
136
MSA
An MSA is a comprehensive contract that sets forth the general terms and conditions that will govern multiple future engagements between the parties.
137
Playbooks
Implementing playbooks, such as through programs like Ansible to enforce and verify settings, enforces desired configurations and can quickly bring non-compliant systems back to the desired state.
138
On-Path Attack
An on-path attack is a type of network attack that involves intercepting or modifying data in transit between two parties, such as by using a packet sniffer or a proxy server, or, in the case above, a rogue WAP.
139
Federation
A federation allows different organizations to share digital identities, enabling single sign-on across them.
140
Secure Erase
Secure erase involves overwriting data in a manner that ensures it's permanently removed and unrecoverable. It's the gold standard for data destruction on a storage device, ensuring utmost privacy and security.
141
Side loading
When u install apps on a mobile device from a non trusted source, not the app store
142
BPA
Business Process Analysis (Process Flow)
143
Port 9