Security+ section 1 Flashcards

1
Q

W.I a preventative control give examples

A

it physically blocks a person firewall (technical), on-boarding policy (managerial), guard shake (operational), doorlock (physical)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

W.I a deterrent control give examples

A

discourages an intrusion attempt splash screen, demotion, reception desk, warning signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

W.I a detective control

A

identifies and logs intrusion attempts. System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

W.I a corrective control

A

performs an action after detection of an intrusion. eg restore backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

W.I a compensating control

A

temporary non-comprehensive correction to an intrusion eg block instead of patrch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

W.I directive control type

A

direct a subject to more secure procedure file storage policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

W.I non-repudiation

A

proof of integrity and proof of origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

W.I the CIA (AIC) triad

A

Availability, integrity (messages cannot be modified without detection), confidentiality (only authorized users see this data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do you get proof of integrity

A

use a hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how do you get proof of origin

A

use a digital signature with a private key which is decrypted using a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I authentication

A

prove who you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I authorization

A

what do you have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

W.I accounting

A

resources used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how do you authenticate a system?

A

with a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the data plane?

A

process the frames packets and network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the control plane?

A

manages the actions of the data plane, define policies and rules, determines how packets should be forwarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

W.I adaptive identity

A

consider information other than Authentication information. eg location relationship to organization. Then if needed create stronger authentication

14
Q

W.I threat scope reduction

A

decrease possible entry points

15
Q

W.I security zone

A

the path of connection

16
Q

W.I policy enforcement point

A

gatekeeper of resources

17
Q

policy decision point

A

decider in policy enforcement point

18
Q

W.I. change management

A

policies for making changes to a system

19
Q

W.I. Public key infrastructure(PKI)

A

policies procedures, hardwar, software, people associated with certificates

20
Q

W.I. out of band key exchange

A

exchange not over internet

21
Q

W.I. secure enclave

A

a protected area for secrets. can be a separate CPU

22
Q

What features does a secure enclave have?

A

own boot ROM, monitors system boot, true RNG, real-time memory encryption, root cryptographic keys, AES encryption in hardware

23
Q

W.I. steganography

A

information is hidden inside of other data

24
Q

W.I. data masking

A

hiding part of the information

25
Q

W.I. a wildcard certificate

A

1 certificate for man devices using the same domain name

26
Q

W.I. certificate revocation list

A

a list of certificates you no longer wish to use maintained by certificate authority

27
Q

W.I. online certificate status protocol (OCSP)

A

scalable OSCP checks

28
Q

name types of threat actors

A

Nation state, unskilled, hacktivist, insider threat, organized crime, Shadow IT

29
Q

W.I. a watering hole attack

A

attacker corrupts a 3rd party resource you intend to use

30
Q

W.I. a memory injection attack

A

injecting malicious code into an other process so that it executes from a legitimate process.

31
Q

W.I. a buffer overflow attack

A

modifying a variable to use more memory than expect to modify an other variable

32
Q

W.I. a race condition

A

a variable is used for a process but while its being used it is modified by an other process

33
Q

W.I. a malicious update attack?

A

malware embedded in an update or when you install a fake update

34
Q

W.I. a cross site scripting attack?

A

executing code inside a legitimate site

35
Q

W.I. dns poisoning/ spoofing

A

modification of the host files on a dns server which allows the modification of the response that is sent to requests

36
Q

W.I. domain hijacking

A

gain access to the full qualified domain name

37
Q

URL hijacking

A

using URL that is very close to the legitimate site

38
Q
A