Deck1_Domain1_General_Security_Concepts Flashcards

(60 cards)

1
Q

What are the three pillars of the CIA Triad?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Confidentiality protect?

A

Ensures data is seen only by authorized parties. Controls: encryption, access controls, MFA, data classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Integrity protect?

A

Ensures data has not been tampered with or altered. Controls: hashing, digital signatures, checksums, write-once logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Availability protect?

A

Ensures systems and data are accessible when needed. Controls: redundancy, backups, load balancers, failover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware primarily threatens which CIA pillar?

A

Availability — it encrypts data and systems, making them inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A data breach primarily threatens which CIA pillar?

A

Confidentiality — unauthorized parties gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tampered audit logs threaten which CIA pillar?

A

Integrity — the logs have been altered and can no longer be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does AAA stand for in security?

A

Authentication, Authorization, and Accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Authentication?

A

Verifying identity — answering ‘Who are you?’ Examples: passwords, fingerprints, smart cards, MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authorization?

A

Granting or denying access — answering ‘What can you do?’ Examples: file permissions, RBAC policies, firewall rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Accounting?

A

Logging and tracking activity — answering ‘What did you do?’ Examples: SIEM logs, audit trails, session recording.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which always comes first: authentication or authorization?

A

Authentication. You must verify WHO someone is before deciding WHAT they can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IAM?

A

Identity and Access Management (eye-ay-em) — the umbrella discipline for managing identities, credentials, and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RBAC?

A

Role-Based Access Control (ar-back) — permissions assigned based on job role within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ABAC?

A

Attribute-Based Access Control (ay-back) — access decisions based on attributes like time, location, device, and user properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does RBAC differ from ABAC?

A

RBAC assigns permissions by job role (simple). ABAC uses multiple attributes for granular, context-aware decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the principle of least privilege?

A

Users get only the minimum permissions needed to perform their job — nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is separation of duties?

A

No single person should control an entire critical process. Requires multiple people to complete sensitive tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is MFA?

A

Multi-Factor Authentication (em-eff-ay) — requiring two or more different authentication factors to verify identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three MFA factor categories?

A

Something you know (password/PIN), something you have (smart card/phone), something you are (fingerprint/face).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is TOTP?

A

Time-Based One-Time Password (tee-oh-tee-pee) — authentication code that changes every 30 seconds, synced to time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is HOTP?

A

HMAC-Based One-Time Password (aitch-oh-tee-pee) — authentication code that changes with each use, based on a counter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does TOTP differ from HOTP?

A

TOTP is time-based (code expires every 30 seconds). HOTP is counter-based (code changes on each use).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A password + fingerprint = how many factors?

A

Two factors: something you know + something you are. This is valid MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A password + security question = how many factors?
Only one factor category: both are something you know. This is NOT MFA.
26
What is SSO?
Single Sign-On — one login grants access to multiple systems or applications without re-authenticating.
27
What is SAML?
Security Assertion Markup Language (sam-el) — protocol for exchanging authentication/authorization data for enterprise SSO.
28
What is OAuth?
Open Authorization (oh-auth) — protocol for granting third-party access to resources without sharing credentials.
29
What is OpenID Connect (OIDC)?
Authentication layer built on top of OAuth (oh-eye-dee-see) — verifies user identity.
30
How does SAML differ from OAuth?
SAML handles authentication (enterprise SSO). OAuth handles authorization (granting app permissions to resources).
31
How does OAuth differ from OIDC?
OAuth authorizes access to resources. OIDC adds an identity/authentication layer on top of OAuth.
32
What is the Zero Trust model?
Never trust, always verify — regardless of network location. Every access request must be authenticated and authorized.
33
What are the four building blocks of Zero Trust?
Strong identity verification, least privilege access, micro-segmentation, and continuous monitoring.
34
What is micro-segmentation?
Dividing the network into small isolated zones so that compromise in one segment does not spread to others.
35
Is Zero Trust a product or a philosophy?
A philosophy/design approach — not a single product. It crosses all five SY0-701 domains.
36
What is a preventive control?
Stops incidents before they happen. Examples: firewalls, locked doors, encryption, access controls.
37
What is a detective control?
Identifies incidents during or after they occur. Examples: IDS, security cameras, SIEM alerts, log monitoring.
38
What is a corrective control?
Fixes issues after detection. Examples: restoring from backups, patching, antivirus quarantine.
39
What is a compensating control?
An alternative control when the primary control isn't feasible. Provides equivalent protection through a different method.
40
What is a deterrent control?
Discourages threat actors from attempting an attack. Examples: warning signs, visible cameras, security guards.
41
What is symmetric encryption?
Uses one shared key for both encryption and decryption. Fast, used for bulk data. Example: AES.
42
What is asymmetric encryption?
Uses a key pair: public key (encrypt/verify) and private key (decrypt/sign). Slower. Examples: RSA, ECC.
43
What is AES?
Advanced Encryption Standard (ay-ee-ess) — symmetric encryption algorithm; the industry standard for bulk data encryption.
44
What is RSA?
Rivest-Shamir-Adleman (ar-ess-ay) — asymmetric encryption algorithm used for key exchange and digital signatures.
45
What is ECC?
Elliptic Curve Cryptography (ee-see-see) — asymmetric encryption offering strong security with shorter key lengths than RSA.
46
When would you use symmetric vs asymmetric?
Symmetric (AES) for fast bulk data encryption. Asymmetric (RSA/ECC) for key exchange, digital signatures, and small payloads.
47
What is hashing?
One-way function producing a fixed-length output (digest). Verifies integrity — cannot be reversed. Example: SHA-256.
48
How does hashing differ from encryption?
Hashing is one-way (verifies integrity). Encryption is reversible with a key (protects confidentiality).
49
What is a digital signature?
Created with the sender's private key. Proves integrity (not tampered) and non-repudiation (sender cannot deny sending).
50
What is PKI?
Public Key Infrastructure (pee-kay-eye) — system of certificates, certificate authorities, and trust that supports asymmetric encryption.
51
What does a digital certificate prove?
It proves who owns a public key. Issued by a Certificate Authority (CA). Contains the public key and owner identity.
52
What is TLS?
Transport Layer Security (tee-el-ess) — protocol encrypting data in transit. Successor to SSL. Used in HTTPS.
53
What does TLS protect?
Confidentiality and integrity of data in transit. Uses both symmetric (bulk data) and asymmetric (key exchange) encryption.
54
Name four categories of threat actors.
Nation-states, organized crime, hacktivists, and insider threats.
55
What motivates nation-state threat actors?
Espionage, political disruption, military intelligence. They are well-funded, persistent, and sophisticated.
56
What is an insider threat?
A current or former employee, contractor, or partner who misuses authorized access to harm the organization.
57
What is the difference between a vulnerability and a threat?
A vulnerability is a weakness. A threat is what could exploit it. Risk exists where they overlap.
58
What is defense in depth?
Layering multiple security controls so that if one fails, others still protect the asset. No single point of failure.
59
What is non-repudiation?
Ensuring a party cannot deny having performed an action. Achieved through digital signatures and audit logs.
60
What is data classification?
Categorizing data by sensitivity level (e.g., public, internal, confidential, top secret) to determine protection requirements.