Test Prep April 2 Flashcards

1
Q

SRTP

A

Secure Real Time Transport Protocol: This encrypts communication with AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NTPsec

A

Secure Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

S/MIME

A

Secure multipurpose internet mail extensions: Requires a public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure POP3

A

Uses STARTTLS to encrypt with SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IMAP

A

Uses SSL to encrypt email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TLS

A

Transport Layer Security: Uses HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTPS

A

HTTP over TLS: Uses Private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec

A

Internet Protocol Security: Security for OSI Layer 3, encryption and packet signing; uses authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTPS

A

File Transfer protocol secure: FTP over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SFTP

A

SSH file transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP

A

Lightweight Directory Access Protocol: Protocol for reading and writing directories over an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SASL

A

Simple authentication and security layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH

A

Secure Shell: encrypted terminal communication replaces telnet and FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS

A

Domain Name System: Easy to poison a DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SNMPv3

A

Simple network management protocol version 3: Has encrypted data, verifies the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP

A

Dynamic Host configuration protocol: This assigns IP addresses to the devices on the network, no secure version of this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stateless Firewall

A

Not secure! Does not keep track of traffic flows, each packet is individually examined, this needs two separate rules, one for outside to inside and another from inside to outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Stateful Firewall

A

Much more secure! They remember the state of the session, only need a single rule. everything within a valid flow is allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

UTM

A

Unified threat management device: Web security gateway, spam filter, malware inspection etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NGFW

A

Next generation firewall: Every packet must be analyzed and categorized before a security decision is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WAF

A

Web application firewall: Applies rules to HTTP/HTTPS conversations This is used with the PCI DSS (payment card industry data security standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Passive footprinting

A

Gather information that will not be seen by the victim. Needs to happen over open source. Can do this through social media, web site etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Wardriving/warflying

A

Combine wifi monitoring and a GPS, search from a car, plane or drone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Active footprinting

A

Actively sending info into the network to gain more information. ping scans, port scans etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Malicious actor

A

a person you are trying to protect your data from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

APT

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Nation State

A

These are governments, commonly an APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

hacktivist

A

often associated to a social or political agenda, specific hacks, no financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

organized crime

A

motivated by money, very sophisticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Order of volatility

A

How long does data stick around: Most volatile - Least: CPU, Memory, temporary file systems, Disk, Remote logging, Network topology, archive media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

RAM

A

Random access memory: Changes constantly, memory dump; grab everything in the RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Swap

A

An area of the storage device to store RAM when memory is depleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

snapshot

A

original image is the full backup, each snapshot is incremented from the last

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

cache

A

A temporary storage area and is designed to speed up performance of an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Embedded systems

A

hardware and software designed for a specific function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

SoC

A

System on a chip: multiple components running on a single chip, difficult to upgrade hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

FPGA

A

Field programmable gate array: An integrated circuit that can be configured after manufacturing, common on routers and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

SCADA/ICS

A

Supervisory control and data acquisition system: Large scale, multi site industrial control system. Often found within manufacturing, not connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

VOIP

A

Voice over internet protocol: Each device is a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

MFD

A

Multifunction devices: everything you need in one single device (example a printer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

RTOS

A

Real time operating system: designed to work on a specific schedule, no time to wait for other processes (example automobiles) no security in place usually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CIS

A

Center for internet security: Used to Design to improve the security posture in your organization and has 20 different controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NIST CSF

A

Cybersecurity framework: Used for commercial cyber framework. 1. Framework core, framework implemetation tiers and framework profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

ISO/IEC 27001

A

Standard for information security management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

ISO/IEC 27002

A

Code of practice for security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

ISO/IEC 27701

A

Privacy information management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ISO 31000

A

International standards for risk management practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SSAE SOC 2 Type I/II

A

These are for the auditing of accounting. SOC2 is the audit documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Type I audit

A

Tests controls in place at a particular time

52
Q

Type II audit

A

Tests controls over a period of at least six months

53
Q

CSA

A

Cloud security alliance: not for profit organization for cloud security controls

54
Q

CCM

A

Cloud control matrix: Cloud specific security controls

55
Q

PII

A

Personally identifiable information: Credit card info, social security numbers etc

56
Q

Containment

A

Every application is running on its own sandbox and is running independently

57
Q

SOAR

A

Security orchestration, automation and response: Integrate third party tools and data sources

58
Q

runbooks

A

Linear checklist of steps to perform step by step approach to automation

59
Q

playbook

A

Conditional steps to follow, a broad process lots of steps in one

60
Q

Federation

A

Allow someone to authenticate to your network using credentials that are stored by a third party.

61
Q

Attestation

A

This proves the hardware is really yours.

62
Q

SMS

A

Short message service: Login can be sent via SMS to a phone number to provide username and password

63
Q

TOTP

A

Time based one time password algorithm: The random number for login will be available for a certain amount of time and then after that time the number will change.

64
Q

HOTP

A

HMAC based one time password algorithm: A number you would use one time to authenticate and never use that number again.

65
Q

EAP

A

Extensible authentication protocol: A standard framework for authentication usually integrates with 802.1x

66
Q

802.1x

A

Port based network access control used with RADIUS, LDAP etc.

67
Q

Supplicant

A

This is the client that is connecting to the network

68
Q

Authenticator

A

This is the device that provides access to the network

69
Q

Authentication Server

A

this validates the username and password

70
Q

EAP-FAST

A

EAP flexible authentication via secure tunneling: Authentication server and supplicant are able to transfer info over a secure tunnel

71
Q

PAC

A

Protected access credential: Supplicant receives the shared secret

72
Q

PEAP

A

Protected extensible authentication protocol: This uses TLS tunnel to share information using a digital certificate and is only on the server.

73
Q

MSCHAPv2

A

Microsoft challenge handshake authentication protocol

74
Q

GTC

A

Generic token card

75
Q

EAP-TLS

A

Transport Layer Security: Strong security, requires digital certificates on all devices. TLS tunnel is built after the certificates are done

76
Q

EAP-TTLS

A

Tunneled transport layer security: can tunnel other protocols within a TLS tunnel. Only needs a single digital certificate

77
Q

RADIUS Federation

A

Members of one organization can authenticate to the network of another organization, uses 802.1x to authenticate

78
Q

CASB

A

Cloud access security broker: Help enforce security policies that were already created. Operates on; visibility, compliance, threat prevention and data security

79
Q

Application configurations

A

This is the most common security concern with the cloud

80
Q

SWG

A

Next-Gen secure web gateway: Provides security with all users across all devices in any location. Can allow or deny certain activities

81
Q

non-credentialed scan

A

The scanner cannot login to the remote device

82
Q

CVE

A

Common vulnerabilities and exposures

83
Q

CVSS

A

Common vulnerability scoring system

84
Q

nmap

A

This is a port scanner to see open and closed ports

85
Q

FDE

A

Full Disk encryption: Encrypt everything on the drive

86
Q

SED

A

Self encrypting drive: Hardware based full disk encryption, no OS software needed

87
Q

MAC

A

Mandatory Access Control: Requires you to have separate security clearance levels and assign documents and users to those clearances

88
Q

DAC

A

Discretionary access control: You create an object and you assign rights and permissions to it

89
Q

RBAC

A

Role Based Access Control: You have rights and permissions based on the role you have

90
Q

ABAC

A

Attribute Based access control: Access may be granted based on many different criteria

91
Q

Rule Based Access control

A

The System admin makes the rules for all the users.

92
Q

PAM

A

Privileged access management: A centralized way to manage access for admins

93
Q

Traceroute

A

A tool to determine the route a packet takes to a destination. Windows use ICMP echo requests. Linux allows you to specify the protocol used

94
Q

nslookup

A

This is a tool to determine the ip addresses on the network

95
Q

dig

A

domain information groper: More advanced version of nslookup

96
Q

ipconfig

A

This will determine the ip configuration of devices

97
Q

pathping

A

combines ping and traceroute, will run a traceroute to an ip address to determine what routes may be between your device and the device your pinging.

98
Q

netstat

A

showing us what ip addresses are communicating to our device and what ip addresses our device is connecting to.

99
Q

arp

A

address resolution protocol: determines mac addresses based on the current ip address

100
Q

COPE

A

Corporate owned, personally enabled: Used as both a corporate and personal device, everything is controlled by the organization

101
Q

VDI/VMI

A

Virtual desktop infrastructure: The apps are separated from the mobile device, the data is separated

102
Q

Preventive control

A

examples are locks and security guards

103
Q

Detective control

A

identifies the intrusion but does not stop it

104
Q

Corrective control

A

similar to an IPS

105
Q

RADIUS

A

Remote authentication dial in service: This is an authentication protocol

106
Q

TACACS

A

Terminal access controller: Remote authentication protocol usually with CISCO

107
Q

Kerboros

A

A type of authentication system that uses single sign on. the client and server authenticate, usually used with microsoft

108
Q

VPN Concentrator

A

the device that encrypts data and sending it out on the network and then decrypting anything it receives

109
Q

HTML5 VPNs

A

Hypertext markup language version 5 supports API interfaces and web cryptography

110
Q

Full tunnel

A

everything that is being transmitted by the remote user is sent to the vpn concentrator on the other side and determines where that data goes

111
Q

Split tunnel

A

some info from the user can go through the tunnel and other info does not have to go through the tunnel

112
Q

L2TP

A

Layer 2 tunneling protocol: Site to site VPN’s use this. These are commonly uses with IPsec networks

113
Q

IPsec

A

Internet protocol security: Security for OSI layer 3, connecting site to site communication uses this. Commonly used for the internet.

114
Q

Tunnel mode

A

this will protect the ip info and the data. both are encrypted with ipsec

115
Q

AH

A

authentication header: Hash of the packet and a shared key and SHA-2 is commonly used

116
Q

ESP

A

Encapsulation security payload: Most ipsec uses this, this encrypts and authenticates the tunneling data using SHA-2 and AES for encryption

117
Q

Jump server

A

Allows us to access internal devices by a private connection on the inside.

118
Q

HSM

A

Hardware security module: A server to manage and control keys within your environment.

119
Q

ARO

A

Annual rate of occurrence: Describes the likelyhood of an event occuring

120
Q

SLE

A

Single loss expectancy: How much money will we loose for an event occuring

121
Q

ALE

A

Annualized loss expectancy: ARO x SLE

122
Q

Transit gateway

A

This is essentially a router within the cloud where all the virtual private clouds can connect to.

123
Q

elasticity

A

the process of providing resources when demand increases and
scaling down when the demand is low.

124
Q

jump server

A

jump server is a highly secured device commonly used to access secure
areas of another network.

125
Q

UPS

A

Uninterruptable power supply: can provide backup power
when the main power source is unavailable

126
Q

Incident Response

A

PICERL: Preperation, identification, containment, eradication, recovery and lessons learned

127
Q

Key Escrow

A

Safely storing private keys