Logical Security Flashcards

(75 cards)

1
Q

Non-physical measures implemented to protect digital data, restrict unauthorized access, and ensure data integrity and confidentiality

A

Logical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security process that provides identification, authentication, and authorization mechanisms for users and computers

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Supports the identities of various assets by defining the resources an asset has permission to access based on the function the asset fulfills | Servers, people & endpoints

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authenticates or proves an identity using more them one method | Something you know, something you have, something you are, something you do, somewhere you are

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tries every possible combination until the password is figured out

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Combination of dictionary and brute force attacks

A

Hybrid Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Something you know - Knowledge - Usernames, passwords, PINs, personal question answers

Something you have - Possession - Smartcards, RSA key fobs, RFID tags

Something you are - Inherence - Fingerprints, retina scans, voice prints

Something you do - Action - How you sign your name, how you draw a pattern, how you say a catchphrase

Somewhere you are - Location - Geotagging, geofencing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of determining whether someone or something is who or what it claims itself to be

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A database that is used to centralize information about the clients and the objects on the network

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP - Port 389

LDAP Secure - Port 636

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organizes and manages everything on the network, including clients, servers, devices, and users

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focused on authentication and authorization within a Windows domain environment

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The domain controller keeps port 88 open to receive service login requests from clients when using Kerberos

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an SSO system, users can have a single strong password or utilize multi-factor authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An XML-based data format that is used to exchange authentication information between a client and a service | Service provider, user agent & identity provider

A

Security Assertion Markup Language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provides centralized administration of dial-up,VPN, and wireless authentication, so it can be used with both 802.1x and the Extensible Authentication Protocol (EAP)

A

Remote Authentication Dial-In User Service (RADISU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RADISU Authentication messages - port 1812

RADISU Accounting messages - Port 1813

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Was developed by Cisco and it can perform the role of an authenticator in an 802.1x network | Used for authentication, authorization, accounting and security features

A

Terminal Access Controller Access Controller System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TACACS+ - Support all protocols

RADIUS - Doesn’t support all protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Security mechanism that generates a temporary, dynamic password or token that is valid only for a short period | Time-based authentication significantly enhances security

A

Time-Based Authentication / (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Using the lowest level of permissions or privileges needed in order to complete a job function or admin task

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An access control method where access is determined by the owner of the resource

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Drawbacks of DAC:

A

Every object in a system has to have an owner

Each owner must determine the access rights and permissions for each object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An access control policy where the computer system gets to decide who gets access to what objects | Used in the military & not in most enterprise networks
Mandatory Access Control (MAC)
26
An access model that is controlled by the system but focuses on a set of permissions versus an individual's permissions
Role-Based Access Control (RBAC)
27
Location of data within a processing system | Data at rest, data in motion, data in processing
Data State
28
Any data stored in memory, a hard drive, or a storage device | full disk encryption, folder encryption, file encryption & database encryption
Data at Rest
29
Any data moving from one computer or system to another over the network or within the same computer
Data in Transit/Motion
30
Any data read into memory or is currently inside the processor and being worked on or manupulated
Data in Use/Processing
31
Provides authentication and encryption of data packets to create a secure and encrypted communication path between two computers
IP Security (IPSec)
32
Five main steps in the process of establishing and using a secure VPN tunnel when you're using IPSec
1. Key exchange request - Site to Site or Client to Site 2. IKE Phase 1 - Main mode or Aggressive mode 3. IKE Phase 2 4. Data transfer 5. Tunnel termination
33
Conducts three two-way exchange between the peers, from the initiator to the receiver
Main Mode
34
Uses fewer exchanges, resulting in few packets and faster initial connection than main mode
Aggressive Mode
35
1. Agree upon which algorithms and hashes will be used to secure the IKE communications throughout the process 2. Use of Diffie-Hellman exchange to generate shared secret keying material so that the two parties can prove their identities 3. Verify the identity of the other side by looking at an encrypted form of the other peer's IP address
36
Only occurs after IKE already established the secure tunnel in Phase 1 using either main or aggressive mode
Quick Mode
37
Allows two system that don't know each other to be able to exchange keys and trust each other
Diffie-Hellman Key Exchange
38
1. PC1 sends traffic to PC2 and then RTR1 initiates creation of IPSec tunnel 2. RTR! and RTR2 negotiate Security Association (SA) to form IKE Phase 1 tunnel (ISAKMP tunnel) 3. IKE Phase 2 tunnel (IPSec tunnel) is negotiated and set up 4. Tunnel is established and information is securely sent between PC1 and PC2 5. IPSec tunnel is torn down an the IPSec SA is deleted
39
Uses packet's original IP header to be used for client-to-site VPNs
Transport Mode
40
When using a client-to-site VPN, it is recommended to use transport mode as the IPSec method
41
Encapsulates the entire packet and puts another header on top of it
Tunneling Mode
42
For site-to-site VPNs, jumbo frames need to be allowed
43
Transport - Client to site Tunneling - Site to site
44
Provides connectionless data integrity and data origin authentication for IP datagrams and provides protection against replay attacks
Authentication Header (AH)
45
Provides authentication, integrity, replay protection, and data confidentiality
Encapsulating Security Payload (ESP)
46
In transport mode, use AH to provide integrity for the TCP header and ESP to encrypt it
47
In tunneling mode, use AH and ESP to provide integrity and encryption of the end payload
48
An entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption
Public Key Infrastructure (PKI)
49
This encryption and decryption process is just one small part of the overall PKI architecture
Public Key Cryptography
50
Issues digital certificates and keeps the level of trust between all of the certificate authorities around the world
Certificate Authority
51
Process where cryptographic keys are stored in a secure, third-party location, which is effectively an "escrow"
Key Escrow
52
Framework for managing digital keys and certificates that facilitate secure data transfer, authentication, and encrypted communications
Public Key Infrastructure (PKI)
53
Public Key Infrastructure (PKI) - Public Key Cryptography Public Key Encryption - Asymmetric encryption and decryption
54
PKI is pivotal in ensuring secure communication and data exchange on the Internet
55
Digitally signed electronic document that binds a public key with a user's identity
Digital Certificate
56
Allows all of the subdomains to use the same public key certificate and have it displayed as valid
Wildcard Certificate
57
Certificate that specifies what additional domains and IP addresses are going to be supported
Subject Alternate Name (SAN) field
58
Only requires the sever to be validated
Single-Sided Certificate
59
Requires both the server and the user to be validated
Dual-Sided Certificate
60
Digital certificate that is signed by the same entity whose identity it certifies
Self-Signed Certificate
61
Digital certificate issued and signed by a trusted certificate authority (CA)
Third-Party Certificate
62
Each certificate is validated using the concept of a root of trust or the chain of trust
Root of Trust
63
Trusted third party who is going to issue these digital certificates
Certificate Authority
64
Requests identifying information from the user and forwards that certificate request up to the certificate authority to create the digital certificate
Registration Authority (RA)
65
A block of encoded text that contains information about the entity requesting the certificate
Certificate Signing Request (CSR)
66
Serves as an online list of digital certificates that the certificate authority has already revoked
Certificate Revocation List (CRL)
67
Occurs when a secure copy of a user's private key is being held
Key Escrow
68
Specialized type of software that allows the restoration of a lost or corrupted key to be performed
Key Recovery Agent
69
70
Refers to how an organization will generate, exchange, store, and use encryption keys
Key Management
71
To get into a website, a person must be able to enter their password, username, and answer two personal questions. How many authentication factors does this website test?
1 - All of the items are something you know, so there is only one factor being teste here
72
What communication protocol does RADIUS use?
UDP
73
In a corporate environment with separate departments needing isolated network access, which process would be most effective for ensuring both network segmentation and traffic monitoring?
Configure a VLAN
74
Nordic Treasures, a small business, has decided that it wants to improve its security stance and take steps to secure its internal communications. It was decided that due to a low budget, they will implement a system that provides better authentication without relying on third-party certificate authorities. Which method would be the most suitable?
Utilizing PKI with self-signed certificates
75
Which type of security measure is used to control access to an area by using a retina scan?
Biometric