Security Flashcards

1
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA

A

Certificate Authority

Digitally signs the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Self-Signed Certificate

A

If only used internally at an organization, no need for a public CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM

A

Identity and Access Management

Give right permissions to right users to prevent unauthorized access
- Identity Management
- Access Control
- Authentication
- Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MFA

A

Multi-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSO

A

Single Sign-On

Only need to sign in one time then have access all day to many resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RADIUS

A

Remote Authentication Dial-In User Service

Centralize authentication for users
- Routers, switches, firewalls, servers, VPN, 802.1X net access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LDAP

A

Lightweight Directory Access Protocol

Read/write from directory on net
like phone book

Username, PW
Also other data to use in setting permissions
- CN = Common name - person or unit
- OU = Org Unit
- O = Org
- L = Location
- ST = State
- C = Country
- DC = Domain Component

Example:
CN=WIDGETWEB, OU=Marketing, O=Widget, L=London, C=GB, DC=widget, DC=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SAML

A

Security Assertion Markup Language

XML-based

Open standard for Authentication/Authorization
Can auth through 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TACACS+

A

Terminal Access Controller Access Control System Plus

Remote authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TOTP

A

Time-based One-Time Password

Use secret key and time of day to generate temp PW
Synch via NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Attract bad actors
Virtual world for attackers to explore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynet

A

Larger fake network to attract attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Locality

A

Regulation that data gathered in country must remain in that country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GDPR

A

General Data Protection Regulation

European regulation
- PII kept in EU
- Users decide and can request removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PCI DSS

A

Payment Card Industry Data Security Standard

Industry standard
Standard for protecting credit/debit card info/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IIOT

A

Industrial Internet of Things

Machine to machine comms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SCADA

A

Supervisory Control and Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICS

A

Industrial Control System

22
Q

OT

A

Operational Technology

Tech that continued ops depend on - critical infrastructure

23
Q

Guest Network

A

Guests can access but no access to organizational resources

24
Q

VLAN Hopping

A

Switch Spoofing
- Pretend to be a switch
- Send trunk negotiation

Double Tagging
- Create a packet with two VLAN tags
- First tag is removed as it goes through a trunk, now second tag is visable and packet is forwarded to target
- One way trip, no response back out of network
- Change the native VLAN ID, Force tagging of all traffic on native VLAN

25
Q

MAC Flooding

A

Switch maintains a list of MACs on the network and interface to comm with the MAC

Attacker sends many frames with different MACs, fill up MAC table
If MAC not found on table, packet is forwarded to all interfaces on switch
Turns switch into hub

Prevent in switch’s port security settings

26
Q

ARP Poisoning

A

IP Spoofing

Attacker pretending to be another IP address

ARP: Who has 192.168.1.1
Device responds with its MAC
Client caches MAC
Client communicates assuming that MAC = 192.168.1.1

27
Q

DNS Poisoning

A

Same as DNS Spoofing

28
Q

Rogue DHCP server

A

IP addresses assigned by an unauthorized server
No security built into DHCP

Countermeasure:
- Enable DHCP snooping on switch
- Manage authorized DHCP servers in Active Directory
- Renew IP leases of devices on network

29
Q

Rogue Access Point

A

Unauthorized wireless access point
May be added by an employee or attacker
Creates vulnerable backdoor onto net

Countermeasure:
- Periodic survey of RF with tools like WiFi Pineapple
- Use 802.1X (Network Access Control)
– Must authenticate regardless of how you connected

30
Q

Evil Twin

A

Access Point set up to look identical to legitimate access point
May increase power output to overpower legitimate APs

Countermeasures:
- Always encrypted traffic/VPN

31
Q

On-Path network attack

A

Man in the Middle

32
Q

Rootkit

A

Malware that hides within your OS

33
Q

NAC

A

Network Access Control
Prompt for authentication any time a device plugs in
Username, PW

34
Q

Port Security

A

Prevent new device being plugged into interface
Based on MAC
Configure specific MACs, Number of MACs

35
Q

ACL

A

Access Control List

Control accesses by Source/Destination IP, Port Number, Time of Day, Application, etc

36
Q

Implicit Deny

A

Last firewall rule should be to deny any traffic that doesn’t match any of the previous rules

37
Q

DAC

A

Discretionary Access Control

give user access/admin on machine

38
Q

MAC

A

Mandatory Access Control

mostly used by gov agencies

39
Q

RBAC

A

Roll-Based Access Control

40
Q

ABAC

A

Attribute-Based Access Control

based on attributes like time of day, geo location, etc

41
Q

DLP

A

Data Loss Prevention

Monitor data at rest, in motion, in use
Analyze net traffic
Identify sensitive data, blocks transmission
Prevent sensitive data leakage

42
Q

OAuth

A

Open Authorization

Auth protocol to grant 3rd party apps access without sharing their password

43
Q

Kerberos

A

Authentication protocol developed in the 80s

44
Q

Which of the existing SNMP versions support(s) encryption? (Select all that apply)
SNMPv1
SNMPv2c
SNMPv3
SNMPv4

A

SNMPv3

There is no v4

45
Q

Which SNMP version(s) use(s) community strings for authentication? (Select all that apply)
SNMPv1
SNMPv2
SNMPv3
SNMPv4

A

SNMPv1
SNMPv2

46
Q

Which SNMP version(s) send(s) authentication data in an unencrypted form? (Select all that apply)
SNMPv1
SNMPv2c
SNMPv3
SNMPv4

A

SNMPv1
SNMPv2c

47
Q

Which of the following answers refer(s) to (a) dedicated software tool(s) designed to monitor and examine the contents of network traffic? (Select all that apply)
Port scanner
Network mapper
Protocol analyzer
Data flow controller
Packet sniffer

A

Protocol analyzer
Packet sniffer

48
Q

Which of the following answers refers to one of the core functionalities of SIEM?
Monitors bandwidth usage across the network
Conducts vulnerability assessments
Enforces security policies on endpoints
Collects, aggregates, and analyzes log data

A

Collects, aggregates, and analyzes log data

49
Q

Which of the following tools is used for evaluating network efficiency and identifying potential bottlenecks (network performance monitoring)?
SNMP
Ping
Nmap
Syslog

50
Q

Which of the tools listed below is used to send echo requests to network devices and services to confirm their availability?
ICMP
Traceroute
RDP
SNMP

A

ICMP

ping is an ICMP message

51
Q

Examples of protocols specifically designed to provide confidentiality and privacy for DNS data include: (Select all that apply)
DNSSEC
DoH
DTLS
DoT
SSL/TLS