Sec+ - Study #2 Flashcards

(39 cards)

1
Q

is designed to securely generate, store, distribute, and rotate encryption keys. It can automatically rotate keys based on a defined schedule or policy

A

Key Management System (KMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a small security chip built into a computer or server that helps protect sensitive information.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tool that collects and analyzes data from multiple sources—like endpoints, networks, servers, and cloud systems—to detect and respond to threats faster.

Think of it like a central security command center that gathers information from all parts of your digital environment and helps spot attacks faster and respond automatically.

A

XDR (Extended Detection and Response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A web application is vulnerable because users can enter SQL commands into a search box and access unauthorized data. What security practice would prevent this issue?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

will execute when a certain event occurs, such as a specific
date and time

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

replaces sensitive data (like credit card numbers or personal information) with a non-sensitive placeholder, that can still be used by systems for processing but has no exploitable value if stolen.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web traffic over port ___ uses HTTPS (Hypertext Transfer Protocol Secure), which encrypts communication between clients and the web server using TLS/SSL.

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a physical device (something you have) that stores a digital certificate for authentication. When paired with a PIN (something you know) or a biometric (something you are), it enables multifactor authentication.

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company connects its network to an external organization to share data. If that organization is compromised, attackers could use the connection to access the company’s network. What type of security risk does this represent?

A

Supply chain attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is responsible for the accuracy, privacy, and security of
the data. Many organizations will hire data __ to ensure all data is
properly protected and maintained.

A

Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company’s HR department decides which employee information to collect and how it will be used for payroll and benefits. What role is the HR department fulfilling in data management?

A

Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

systems that control and monitor industrial operations.

A

ICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describes the process of automation, and is commonly
associated with large scale automation or automating processes between
different systems

A

Orchestration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a networking approach that separates the control plane from the data plane.

Key points:
Control plane: Makes decisions about where traffic should go.
Data plane: Forwards traffic based on those decisions.

A

SDN (Software-Defined Networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

involves reducing its attack surface by eliminating unneeded services, applications, and components. This minimizes the number of potential vulnerabilities that an attacker could exploit.

A

Hardening an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During a cybersecurity incident, an analyst collects server log files after a denial-of-service attack. A month later, another analyst needs to verify that the logs have not been tampered with since they were collected. What technique should be used to confirm the integrity of the log files?

17
Q

In a Discretionary Access Control (DAC) environment, the __ of a file or directory has the ability to set and manage permissions and access rights for other users.

18
Q

is a way to check if an SSL/TLS certificate has been revoked without making the client contact the certificate authority (CA) directly.

A

OCSP Stapling (Online Certificate Status Protocol Stapling)

19
Q

modifies operating system files to become part of the core OS.
The kernel, user, and networking libraries in Windows are core operating
system files.

a thief who not only breaks into a house but also hides behind the walls, so you can’t see them, while secretly controlling things inside.

20
Q

clearly defines who is responsible, accountable, consulted, and informed for specific tasks or controls.

A

Responsibility Matrix

21
Q

is a protocol used to store and validate usernames and passwords within a centralized directory (like Microsoft Active Directory

22
Q

is a trusted service for certificate creation and management

23
Q

involves directly interacting with a target system to gather information — such as performing port scans, ping sweeps, or service enumeration.

It’s like knocking on doors and asking questions to learn about a building, rather than just looking from outside.

A

Active reconnaissance

24
Q

Packet captures let an attacker capture valid requests, session tokens, or authentication messages and then resend those captured packets to the application to impersonate a legitimate user - This is a ___

A

Replay Attack

25
Your company has applications running in AWS, Azure, and Google Cloud. Management wants a secure and efficient way to connect all cloud environments and branch offices together while maintaining centralized control of network traffic. Think of it like a smart traffic system for company networks: it automatically chooses the best route for data based on speed, cost, and reliability instead of manually configuring each connection
SD-WAN
26
___ = the brain — decides where data should go. ___ = the muscle — actually moves the data there
Control plane; Data plane
27
In a zero-trust network, which component is responsible for evaluating access requests and deciding whether a user or device should be allowed to access a resource? Think of it like a security guard checking a rulebook — it evaluates requests and decides “allowed” or “denied” according to the policies.
Policy engine
28
ensures that a sender of a message cannot deny having sent it.
Non-repudiation
29
is the phase in incident response where the goal is to limit the damage and prevent the incident from spreading.
Containment
30
the point where all outbound Internet traffic can be inspected and controlled. Think of it like a gatekeeper for outgoing internet traffic — it decides what requests can leave the network and can block or log them.
Forward proxy
31
are implemented using systems, such as operating system controls, firewalls, or anti-virus software.
Technical controls
32
is associated with security design and implementation. Security policies and standard operating procedures are common examples
Managerial controls
33
A company is deploying a web application on a hardened Linux server. Which step would BEST reduce the risk of attacks against the application itself?
Implement a secure configuration of the web service
34
In change management, a ___ occurs when one task, update, or installation cannot proceed until another task is completed
dependency
35
36
37
38
39