Test 2 Flashcards
Which of the following terms describes the process of identifying differences between an organization’s current security posture and its desired security posture?
Gap analysis
The term “Zero Trust security” refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.
False
Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?
Adaptive identity
What are the key components of the Zero Trust Control Plane’s Policy Decision Point (PDP)? (Select 2 answers)
Policy Engine (PE)
Policy Administrator (PA)
In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP).
True
An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
Which of the following statements about honeypots are true? (Select 2 answers)
Honeypots mimic real systems to attract cyber attackers
Honeypots contain apparent vulnerabilities that are closely monitored by a security team
What is a honeynet in the context of cybersecurity?
A network of honeypots
Which of the answers listed below refers to a honeynet example?
A network of fake websites
A network of fake servers
A network of fake databases
A network of fake file shares
A honeyfile can be any type of file (e.g., a document, email message, image, or video file) containing real user data intentionally placed within a network or system to attract potential attackers or unauthorized users.
False
A honeyfile can be used for:
Attracting cyber attackers
Triggering alerts when accessed
Monitoring network activity
What is a honeytoken?
A unique identifier that is designed to track attackers
Which of the following should not be used as honeytokens? (Select all that apply)
Actual URLs to live websites or resources
Active user account credentials
A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:
BIA
A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as:
PKI