Things from their flashcards would like to recap

1
Q

What is an airgap?

A

An air gap in cybersecurity is a network security measure that physically isolates a computer or network from unsecured networks, like the internet, to enhance security.

This “gap” prevents direct or indirect communication between the protected system and external networks, reducing the risk of cyber threats like malware or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CSP stand for

A

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the term allow list mean?

A

Apps, systems or networks that are in scope and should be tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the portions of a network packet?

A

A network packet is typically divided into three main portions: the header, the payload, and the trailer.

The header contains information about the packet, such as source and destination addresses, while the payload is the actual data being transmitted. The trailer provides information about the end of the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is an xml injection

A

when a user enters values in an xml query that takes advantage of security loopholes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does NIST stand for

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does SASE stand for

A

Secure Access Service Edge

Secure Access Service Edge (SASE) is a network architecture that consolidates network connectivity and security functions into a single, cloud-delivered platform. It combines Wide Area Networking (WAN) capabilities with security services like Secure Web Gateways (SWG), Cloud Access Security Brokers (CASB), Firewalls as a Service (FWaaS), and Zero Trust Network Access (ZTNA). This approach moves security controls to the cloud edge, making it easier to manage and secure remote users, devices, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECDHE

A

Elliptic Curve Diffe Hellman Ephemeral

is a key exchange algorithm that allows two parties to establish a shared secret over an insecure channel using Elliptic Curve Cryptography (ECC). The “ephemeral” part refers to the fact that the keys used in the exchange are temporary and discarded after use, enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PFS

A

Perfect Forward Secrecy (PFS) is a cryptographic technique that ensures even if an attacker compromises a long-term secret key (like a server’s private key), they cannot decrypt past communications. It does this by using ephemeral session keys that are generated separately for each session.

PFS is widely used in protocols like SSL/TLS (Transport Layer Security) to protect web traffic and other secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an allow list

A

An allow list, also known as a whitelist, is a curated list of entities (like email addresses, IP addresses, or applications) that are explicitly granted permission to access or interact with a system, network, or service. It operates on the principle of “allow everything by default and block everything that isn’t explicitly allowed”. This approach helps enhance security by limiting access to only trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the IPSec modes

A

IPsec has two main operational modes: Transport Mode and Tunnel Mode. Transport Mode primarily secures data within the packet payload, while Tunnel Mode encrypts and authenticates the entire packet, including the IP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a hyper visor

A

A hypervisor is software that allows multiple operating systems (OS) to run on a single physical machine, each in its own virtual machine (VM). It acts as a virtual machine monitor (VMM), managing the allocation of physical resources like CPU, memory, and storage to these VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is UDP

A

UDP, or User Datagram Protocol, is a transport layer protocol used for sending data over a network. Unlike TCP, UDP is a connectionless protocol, meaning it doesn’t require a handshake to establish a connection before sending data. UDP is faster and more efficient than TCP, but it’s also less reliable because it doesn’t guarantee data delivery or order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DMARC

A

DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It’s an email authentication protocol that helps to protect email senders and recipients from spoofing and phishing attacks by verifying the sender’s identity. DMARC builds on the existing SPF and DKIM protocols to provide a more robust email authentication system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spf

A

In cybersecurity, SPF stands for Sender Policy Framework, an email authentication protocol that helps prevent email spoofing. It allows domain owners to specify which servers are authorized to send emails on their behalf. By verifying if an email comes from an authorized source, SPF helps ensure that legitimate emails are delivered and reduces the risk of phishing and spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between RADIUS and TACACS+

A

RADIUS and TACACS+ are both Authentication, Authorization, and Accounting (AAA) protocols, but they differ in their primary use cases. RADIUS is mainly used for user authentication and network access, while TACACS+ is primarily used for managing access to network devices. TACACS+ offers stronger security through packet encryption and more granular authorization control.

16
Q

What does IR stand for

A

Incident response