Security Controls Flashcards

1
Q

what is the difference between auditing and monitoring?

A

auditing is one time whereas monitoring is an ongoing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a penetration test an audit or monitoring?

A

an audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

whats a kensington lock?

A

a cable that uses a tie to secure smaller devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is DAC?

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how is DAC utilized?

A

access control method where access is determined by the owner of the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is MAC?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how is MAC (Message Authentication Code) utilized?

A

access control policy where the computer system decides who gets access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is RBAC?

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how is RBAC(Role Based Access Control) utilized?

A

access model that is controlled by the system that focuses on a set of permissions versus an individuals permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is Zero Trust?

A

security framework that requires the users to be authenticated, authorized and validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is identification?

A

provides identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is authentication?

A

validates identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a TOTP?

A

time based one time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does a TOTP(Time Based One Time Password) do?

A

computes password from a shared secret and the current time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is HOTP?

A

HMAC Based One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does a HOTP do?

A

computes password from a shared secret and is synchronized across the client and server.

17
Q

what is in band authentication?

A

relies on an identity signal from the same system requesting the user authentication.

18
Q

what is out of band authentication?

A

uses a separate communication channel to send the OTP or PIN

19
Q

what is EMM

A

Enterprise Mobility Management

20
Q

what is MDM?

A

Mobile Device Management