Objective 4.1 Flashcards

(31 cards)

1
Q

Which term describes converting readable data into a coded format to protect it from unauthorized access?
- Encryption
- Authentication
- Hashing
- Authorization

A

Encryption | Practical Use: Protecting credit card numbers during online purchases. | Explanation: Encryption secures data by transforming it into unreadable code unless decrypted with the proper key. | Objective: 4.1 – Logical security | Follow-up Question: What’s the difference between encryption and hashing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of encryption protects information while it is being transferred across a network?
- Data archived
- Data in transit
- Data replicated
- Data at rest

A

Data in transit | Practical Use: HTTPS encrypting web traffic to prevent eavesdropping. | Explanation: Data in transit encryption protects data as it moves between endpoints. | Objective: 4.1 – Logical security | Follow-up Question: What protocol is commonly used to encrypt data in transit on websites?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of encryption protects stored files on a hard drive or USB stick?
- Data at rest
- Data in transit
- Data cached
- Data mirrored

A

Data at rest | Practical Use: Full Disk Encryption (BitLocker) securing a laptop hard drive. | Explanation: Encryption at rest prevents unauthorized access to stored information. | Objective: 4.1 – Logical security | Follow-up Question: Why is encrypting laptops especially important for organizations?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary purpose of a digital certificate?
- Provide physical device authentication
- Encrypt stored files
- Generate hashing algorithms
- Verify identity and enable secure communication

A

Verify identity and enable secure communication | Practical Use: Websites using SSL/TLS certificates to prove legitimacy. | Explanation: Certificates bind a public key to an entity to ensure trust in communications. | Objective: 4.1 – Certificates | Follow-up Question: What’s the difference between a trusted CA certificate and a self-signed one?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which framework manages the creation, distribution, and revocation of digital certificates?
- SSL
- RADIUS
- Public Key Infrastructure (PKI)
- LDAP

A

Public Key Infrastructure (PKI) | Practical Use: PKI supports digital signatures and secure web browsing. | Explanation: PKI provides the structure for managing certificates and keys. | Objective: 4.1 – Certificates | Follow-up Question: What role does a Certificate Authority (CA) play in PKI?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of certificate is created and signed by the same organization using it?
- Domain certificate
- Self-signed certificate
- PKI certificate
- CA-issued certificate

A

Self-signed certificate | Practical Use: Internal testing environments. | Explanation: Self-signed certificates encrypt data but are not trusted by outside parties. | Objective: 4.1 – Certificates | Follow-up Question: Why are self-signed certificates not recommended for public websites?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which framework manages digital identities and controls user access to resources?
- IAM (Identity and Access Management)
- PKI
- LDAP
- MFA

A

IAM (Identity and Access Management) | Practical Use: Controlling employee access to corporate applications. | Explanation: IAM enforces policies to ensure the right people have the right access. | Objective: 4.1 – IAM | Follow-up Question: How does IAM help with regulatory compliance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which process validates a user’s identity before allowing system access?
- Authentication
- Role assignment
- Encryption
- Authorization

A

Authentication | Practical Use: Entering a password to log in to an account. | Explanation: Authentication ensures a person is who they claim to be. | Objective: 4.1 – IAM | Follow-up Question: What’s the difference between authentication and authorization?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security method requires multiple factors such as a password and a fingerprint?
- SSO
- Role-based access
- MFA
- PKI

A

MFA | Practical Use: Banking apps requiring a password + SMS code. | Explanation: MFA strengthens security by requiring two or more verification methods. | Objective: 4.1 – IAM | Follow-up Question: What are the three categories of authentication factors?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which method allows a user to log in once and access multiple applications without re-entering credentials?
- RADIUS
- LDAP
- SSO
- MFA

A

SSO (Single Sign-On) | Practical Use: Logging into Microsoft 365 and gaining access to Outlook, Teams, and SharePoint. | Explanation: SSO reduces login fatigue and improves security. | Objective: 4.1 – IAM | Follow-up Question: Why can SSO create a single point of failure if not secured?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol provides centralized authentication, authorization, and accounting (AAA)?
- LDAP
- PKI
- TACACS+
- RADIUS

A

RADIUS | Practical Use: ISPs verifying customer logins. | Explanation: RADIUS authenticates users and tracks usage across networks. | Objective: 4.1 – IAM | Follow-up Question: How does RADIUS differ from TACACS+?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol is designed to access and maintain distributed directory information services?
- SAML
- PKI
- RADIUS
- LDAP

A

LDAP | Practical Use: Managing user accounts in Active Directory. | Explanation: LDAP organizes and provides access to directory-based user info. | Objective: 4.1 – IAM | Follow-up Question: What port does LDAP typically use?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which open standard allows identity providers to share authentication data with service providers?
- MFA
- PKI
- SAML
- LDAP

A

SAML | Practical Use: Using Google to log into a third-party application. | Explanation: SAML exchanges authentication/authorization information between systems. | Objective: 4.1 – IAM | Follow-up Question: How does SAML help with federated identity management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol separates authentication, authorization, and accounting for granular access control?
- LDAP
- SAML
- TACACS+
- RADIUS

A

TACACS+ | Practical Use: Managing admin access to Cisco network devices. | Explanation: TACACS+ provides flexible, detailed access control. | Objective: 4.1 – IAM | Follow-up Question: Why might TACACS+ be preferred over RADIUS in device management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which authentication method generates time-limited codes that expire after a short duration?
- RBAC
- Time-based authentication
- MFA
- SAML

A

Time-based authentication | Practical Use: Using Google Authenticator for one-time passcodes. | Explanation: Time-based codes reduce risk by limiting the window for unauthorized use. | Objective: 4.1 – IAM | Follow-up Question: How does time-based authentication strengthen MFA?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which concept determines what actions a user can take after login?
- MFA
- Authentication
- Encryption
- Authorization

A

Authorization | Practical Use: A user can view files but not delete them. | Explanation: Authorization assigns permissions to users after authentication. | Objective: 4.1 – IAM | Follow-up Question: How do authorization and least privilege relate?

17
Q

Which principle requires that users only have the minimum access needed to perform their jobs?
- Least privilege
- MFA
- SSO
- RBAC

A

Least privilege | Practical Use: A finance clerk can only access payroll, not HR or IT systems. | Explanation: Least privilege reduces accidental/malicious misuse of access. | Objective: 4.1 – IAM | Follow-up Question: What is a risk of not applying least privilege?

18
Q

Which method assigns permissions based on a person’s job responsibilities?
- MFA
- RBAC
- RADIUS
- SSO

A

RBAC (Role-Based Access Control) | Practical Use: HR staff can access HR systems, but not finance. | Explanation: RBAC groups permissions by role, simplifying admin. | Objective: 4.1 – IAM | Follow-up Question: How does RBAC simplify large organizations?

19
Q

Which technology uses GPS or Wi-Fi boundaries to control access or trigger actions?
- Geofencing
- RBAC
- PKI
- RADIUS

A

Geofencing | Practical Use: Banking app requiring login only within a country. | Explanation: Geofencing sets a virtual perimeter for access control. | Objective: 4.1 – Logical security | Follow-up Question: Why might geofencing be useful in BYOD policies?

20
Q

Which physical security tool provides real-time monitoring and acts as a deterrent to intruders?
- Locks
- Honeypots
- Geofencing
- Security cameras

A

Security cameras | Practical Use: CCTV in data centers. | Explanation: Cameras deter unauthorized entry and record evidence. | Objective: 4.1 – Physical security | Follow-up Question: What is a potential limitation of relying only on cameras?

21
Q

Which physical measure controls who can physically access rooms or devices?
- RBAC
- Cameras
- MFA
- Locks

A

Locks | Practical Use: Badge-controlled server room doors. | Explanation: Locks prevent unauthorized physical access to sensitive areas. | Objective: 4.1 – Physical security | Follow-up Question: How can electronic locks enhance security compared to traditional locks?

22
Q

Which decoy system is designed to attract attackers and study their methods?
- IDS
- Honeynet
- Honeypot
- Firewall

A

Honeypot | Practical Use: Fake server deployed to collect attacker behavior. | Explanation: Honeypots mislead attackers and gather intelligence. | Objective: 4.1 – Deception technologies | Follow-up Question: Why are honeypots risky if not isolated properly?

23
Q

Which decoy involves an entire network of honeypots to study coordinated attacks?
- DMZ
- VPN
- Honeynet
- IDS

A

Honeynet | Practical Use: Research environments studying attacker patterns. | Explanation: Honeynets expand deception with multiple fake systems. | Objective: 4.1 – Deception technologies | Follow-up Question: How can honeynets improve overall defense strategies?

24
Q

Which term describes the potential for loss if a threat exploits a vulnerability?
- Risk
- Exploit
- CIA
- Threat

A

Risk | Practical Use: Storing unencrypted data on laptops creates high risk. | Explanation: Risk = likelihood × impact of a security event. | Objective: 4.1 – Common terminology | Follow-up Question: How do organizations reduce risk?

25
Which term refers to a weakness that could be exploited by a threat? - Risk - Threat - Vulnerability - Exploit
Vulnerability | Practical Use: An unpatched operating system. | Explanation: Vulnerabilities are flaws that attackers exploit. | Objective: 4.1 – Common terminology | Follow-up Question: What’s an example of a human vulnerability?
26
Which term describes the method used to take advantage of a vulnerability? - Exploit - Risk - Vulnerability - Threat
Exploit | Practical Use: Malware exploiting an OS bug. | Explanation: Exploits are tools/techniques used against vulnerabilities. | Objective: 4.1 – Common terminology | Follow-up Question: How does patching help prevent exploits?
27
Which term describes anything that can cause harm to data or systems? - Threat - CIA - Risk - Exploit
Threat | Practical Use: Hackers, insider misuse, or natural disasters. | Explanation: Threats can be intentional or accidental dangers. | Objective: 4.1 – Common terminology | Follow-up Question: How does threat differ from vulnerability?
28
Which three principles form the CIA triad in cybersecurity? - Confidentiality, Integrity, Availability - Certification, Integrity, Access - Confidentiality, Information, Assets - Control, Isolation, Authentication
Confidentiality, Integrity, Availability | Practical Use: Ensuring sensitive data is private, accurate, and accessible. | Explanation: The CIA triad is the foundation of security goals. | Objective: 4.1 – Common terminology | Follow-up Question: Which part of CIA is impacted by a DoS attack?
29
Which term refers to the geographic location where data is stored and processed? - GDPR - Data locality - PCI DSS - Risk
Data locality | Practical Use: EU laws requiring personal data to stay in EU servers. | Explanation: Data locality ensures compliance with regional storage laws. | Objective: 4.1 – Compliance | Follow-up Question: Why is data locality important for cloud providers?
30
Which compliance framework protects credit card holder data? - GDPR - HIPAA - PCI DSS - Data locality
PCI DSS | Practical Use: Retailers securing card transactions. | Explanation: PCI DSS sets security standards for payment processing. | Objective: 4.1 – Compliance | Follow-up Question: What’s one PCI DSS control requirement?
31
Which regulation governs personal data handling in the EU? - PCI DSS - GDPR - SOX - Data locality
GDPR | Practical Use: EU users must consent before data collection. | Explanation: GDPR protects personal data rights and regulates usage. | Objective: 4.1 – Compliance | Follow-up Question: What rights does GDPR give to individuals over their data?