SON 1 Flashcards

1
Q

What is the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the CIA triad like putting files in a safe?

A

-opened by you
-edited by you
-safe is available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who fights CIA?

A

DAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DAD?

A

Disclosure
Alteration
Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do spy DADs do to CIA safes?

A

-Read files
-Edit files
-Steal files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero Trust and safes?

A

Nobody can be trusted in a room with the safe!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Repudiation and safes?

A

fingerprints on the safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 concepts within Zero-Trust

A

Data Plane
Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication examples

A

Biometrics
Knowledge-Based
Multiple Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tools systems use to Authenticate?

A

Certs & keys
IP Allow list
MAC Addr Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How systems authorize subjects?

A

Permissions & Privileges
Access Control
Authorization Models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example of Access Control

A

Access Control Lists (ACLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example authorization models

A

Mandatory Access Control
Discretionary Access Control
(MAC&DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to do network Accounting?

A

User Activity Tracking
Audit Trails & Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GAP Analysis?

A

ID gap in security