Logical Security Flashcards

(13 cards)

1
Q

What are the 5 tasks of IAM?

A

Identity and Access Management (IAM):
- Create and deprovision accounts
- Manage accounts
- Audit accounts
- Evaluate identity-based threats
- Maintain compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 subjects that can have user accounts?

A
  • Personell
  • Endpoints
  • Servers
  • Softwares
  • Roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 types of factors for MFA?

A
  • Knowledge: Username, Password etc.
  • Possesion: Smart Card, Key etc
  • Inherence: Fingerprints, Retina Scan
  • Action: How you sign your name
  • Location: Geotagging, Geofencing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 8 most important types of authentication?

A
  1. Local Authentication
  2. Ligthweight Directory Access Protocol (LDAP)
  3. Kerberos
  4. Single Sign-On (SSO)
  5. Security Assertion Markup Language (SAML)
  6. RADIUS
  7. TACACS+ (Cisco only)
  8. Time Based Authentication / OTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 types of access control policies?

A
  • Discretionairy Access Control (DAC): The owner of a ressource decides who has access
  • Mandatory Access Controll (MAC): Different access levels are defined, you can access a ressource if you have the same or a higher level
  • Role Based Access Control (RBAC): Different roles are created like Sales, HR, IT etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 states of data?

A
  • Data at rest
  • Data in transit/motion
  • Data in processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 4 security features does IPSec provide and how?

A
  1. Confidentiality: By using data encryption
  2. Integrity: By ensuring data wasnt modified through hashes
  3. Authentication: Verify each party is who they claim to be
  4. Anti-Replay: By checking sequence numbers on packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 5 steps of the IPSec tunnel creation?

A
  1. Key Exchange Request
  2. Internet Key Exchange (IKE) Phase 1
  3. Internet Key Exchange (IKE) Phase 2
  4. Data Transfer
  5. Tunnel Termination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Diffie-Hellman Key Exchange?

A

It allows two systems that dont know each other to excahnge keys and then trust each other. This happens by creating a shared secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats the difference between Transport and Tunneling Mode in IPSec?

A

Transport Mode: Uses packets original IP header, best for Client-to-Site VPNs

Tunneling Mode: Encapsulates the entire packet and puts another header on it. Thats best for Site-to-Site VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the AH and ESP in IPSec?

A

The Authentication Header (AH) provides connectionless data integrity and protection against replay attacks.

The Encapsulating Security Payload (ESP) provides authentication, integrity, replay protection and data confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is PKI?

A

Public Key Infrastructure (PKI) is the system used to create Public/Private Key Pairs used in assymetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are self-signed certificates?

A

Certificates that are issued by the same person it validates, thus they dont give a lot of trust but are mostly used for encryption or personal use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly