Sec+ - Study #4 Flashcards

(47 cards)

1
Q

is the practice of dividing a network into smaller, isolated sections to improve security and performance.

Think of it like dividing a building into separate rooms with locked doors — if an intruder gets into one room, they can’t freely move through the whole building.

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the process of making data, code, or information harder to understand or interpret, even if someone gains access to it.

Think of it like writing a message in a secret code — the information is still there, but it’s disguised so others can’t easily make sense of it.

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the process of converting readable data (plaintext) into an unreadable format (ciphertext) so that only authorized users with the correct decryption key can access it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

are temporary access credentials that expire after a short time. They’re used to limit how long someone or something can access a system or resource, reducing the risk if those credentials are stolen.

A

Ephemeral Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a set of rules that lets different software programs talk to each other. It defines how requests and responses should be structured so systems can share data or functions.

It’s like a waiter in a restaurant — you (the user) tell the waiter what you want, and the waiter gets it from the kitchen (server) and brings it back to you.

A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a network access control method that requires devices to authenticate before gaining network access. It uses credentials (like certificates or usernames/passwords) to verify that only authorized users or devices can connect.

It’s like a security checkpoint that verifies your ID before you’re allowed into a restricted area — only approved personnel get through.

A

802.1X authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a technique used to make stored passwords more secure by adding random data to the password before hashing it.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the process of converting data (like a password or file) into a fixed-length string of characters using a mathematical algorithm

It’s like turning a message into a fingerprint — even a tiny change creates a completely different fingerprint.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a hashing algorithm that converts data into a 128-bit (32-character) hash value.

Used for file integrity checks and verifying data hasn’t changed.

Not secure for passwords or sensitive data because it’s vulnerable to collisions (two different inputs producing the same hash).

A

MD5 Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a cryptographic hash function that converts data into a 256-bit (64-character) fixed-length hash.

Used for password storage, digital signatures, and verifying data integrity.

Commonly used in blockchains, SSL/TLS certificates, and secure file verification.

A

Sha-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company wants to store user passwords securely and ensure that even if the password database is stolen, attackers cannot easily reverse the hashes. They also need a hash function that reliably detects any tampering with files or messages. Which cryptographic hash function should the company use?

A

SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A developer needs a fast way to verify that downloaded files haven’t been corrupted during transfer. They don’t require strong protection against attacks, only a simple checksum to detect accidental changes. Which hash function would be appropriate for this use case?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a security system that monitors network traffic for suspicious activity or policy violations and alerts administrators when potential threats are detected.

A

NIDS (Network Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ focuses on real-time network traffic, while __ aggregates and analyzes data from multiple sources for broader threat detection and investigation.

A

NIDS, SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a high-capacity network switch at the center of an enterprise network, connecting all distribution or access switches.

The main highway hub where all roads (network segments) meet.

A

Core Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a special switch port configured to copy all network traffic from other ports or VLANs to itself.

A traffic camera placed on the highway hub that records all cars passing through without stopping them.

A

Mirrored Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

connectionless transport layer protocol used for sending messages (datagrams) across a network without establishing a connection or guaranteeing delivery.

Think of it like sending a postcard — you drop it in the mailbox and hope it arrives, but you don’t get a confirmation and there’s no guarantee it won’t get lost.

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a connection-oriented transport layer protocol that ensures reliable, ordered delivery of data between devices on a network.

Think of it like sending a series of certified letters — each one is tracked, and the sender gets confirmation that it arrived in the right order.

A

TCP (Transmission Control Protocol)

Ex. When you open a website using HTTPS, your browser uses TCP to establish a connection with the server, ensuring all webpage data is delivered completely and in the correct order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a risk assessment approach that uses numerical values and data to measure the likelihood and impact of risks.

A

Quantitative risk

20
Q

is a risk assessment approach that uses descriptions, categories, or rankings rather than numbers to evaluate the likelihood and impact of risks.

It’s like color-coding hazards in a workplace — red for severe, yellow for moderate, green for low — to guide attention and resources.

A

Qualitative Risk

21
Q

is any attempt to exploit vulnerabilities in wireless networks or devices (Wi‑Fi, Bluetooth, NFC, etc.) to intercept, disrupt, or gain unauthorized access to communications or systems.

Common goals are eavesdropping (sniffing), man-in-the-middle (MITM), credential theft, or network disruption (jamming).

A

Wireless attack

22
Q

are protocols used to encrypt data in transit over networks, most commonly for web traffic (HTTPS).

Think of it like locking your messages in a secure envelope before sending them over the internet — even if someone intercepts it, they can’t read the contents.

A

TLS (Transport Layer Security) / SSL (Secure Sockets Layer)

23
Q

a protocol used to securely access and manage remote devices over a network. It encrypts all communications, including login credentials and commands, to prevent eavesdropping.

Think of it like a secure tunnel between your computer and a remote server — whatever you send through the tunnel is protected from prying eyes.

A system administrator uses __ to log into a Linux server from home. All commands and data sent over __ are encrypted, preventing attackers from intercepting the session.

A

SSH (Secure Shell)

24
Q

when an attacker captures valid authentication data (like usernames/passwords, tokens, or session cookies) and reuses those credentials to try to log in as the legitimate user.

A

Credential replay attack

25
is an access control model where the owner of a resource decides who can access it and what permissions they have. A user creates a file on their computer and allows specific colleagues to read or edit it, while others cannot
DAC (Discretionary Access Control)
26
an access control model where access to resources is strictly enforced by the system based on security labels or classifications, and users cannot change permissions. A classified document labeled “Top Secret” can only be accessed by users whose clearance level is Top Secret or higher. Even the document owner cannot grant access to someone with lower clearance.
MAC (Mandatory Access Control)
27
is an access control model that grants or denies access based on features of the user, the resource, the environment, and the action being requested. It’s like a club bouncer who checks your ID, VIP status, the day of the week, and what you’re wearing before letting you in.
ABAC (Attribute-Based Access Control)
28
when an attacker tries every possible password or key combination until they find the correct one to gain access to a system, account, or encrypted data. An attacker uses a program to test every possible password for a user’s email account until it finally matches the correct one.
Brute-force
29
a special type of electronic fingerprint created using cryptography. It proves that a message or document really came from the claimed sender and that it wasn’t changed along the way. Think of it like a tamper-proof wax seal — it proves who sent the message and that no one opened or changed it.
Digital Signature
30
is a technique used to make stored passwords more secure against brute-force attacks. It works by applying a hashing function many times or using a complex algorithm to make the process slower and more difficult for attackers. This means even if hackers get the hashed passwords, cracking them takes much longer. Unlike digital signatures or certificates that verify identity, key stretching is focused on strengthening password protection.
Key Stretching
31
a security practice where users or administrators are given temporary access to systems or resources only when needed and for a limited time An IT admin requests temporary admin access to a server to apply updates. The system grants access for 1 hour, after which the privileges are automatically revoked
Just-in-time permissions
32
a protocol used to check in real time whether an SSL/TLS certificate has been revoked. like calling the front desk of a hotel to check if a guest’s room key has been deactivated — you get an instant answer.
OCSP (Online Certificate Status Protocol)
33
a dedicated, isolated processor or secure area within a device (like a smartphone or computer) that stores and processes sensitive data such as encryption keys, biometric data, or passwords Think of it like a vault inside your computer or phone — only the vault itself can access its contents, and no one else (apps, malware, or even the OS) can see inside.
Secure Enclave
34
a list of SSL/TLS certificates that have been revoked by a Certificate Authority (CA) before their expiration date. Think of it like a printed list of invalid or canceled hotel key cards. If a key is on the list, it should no longer be trusted.
CRL (Certificate Revocation List)
35
a security principle where users, programs, or processes are given only the minimum access or permissions necessary to perform their tasks — nothing more. A junior employee only has read access to company reports but cannot edit or delete them. If their account is hacked, the attacker can only view reports, not modify or delete sensitive data.
Least Privilege
36
defines the maximum acceptable amount of data loss after a disaster. If the company’s current recovery process doesn’t meet the RPO, it means too much data could be lost. __ reduces potential data loss and ensures recovery aligns with the RPO.
RPO (Recovery Point Objective), Enhancing backup frequency
37
any confidential business information that provides a company with a competitive advantage. It is not generally known to the public and is protected as long as it remains secret. Think of it as a company’s secret recipe, formula, or process that makes their product special — like the Coca-Cola formula or Google’s search algorithm.
Trade secret
38
Enabling __ on the wireless network is the most effective strategy to secure it against eavesdropping Ex. A coffee shop upgrades its Wi-Fi to ___. Even if someone captures the network traffic, they cannot easily decrypt other customers’ data or brute-force the Wi-Fi password.
WPA3 encryption
39
the process of using a strong magnetic field to erase data from magnetic storage devices such as hard drives, tapes, or floppy disks.
Degaussing
40
happens when a program writes more data into a fixed-size memory buffer than it can hold, which overwrites adjacent memory and can cause crashes or let an attacker run malicious code.
Buffer Overflow
41
occurs when an attacker captures valid data (for example, a login token, authentication message, or transaction) and resends it later to impersonate the original sender or repeat a legitimate action. It’s like someone recording you giving permission to enter your house, then playing the recording later to get in — the message is valid, but the reuse is fraudulent.
Replay attack
42
a cybersecurity platform that collects and correlates data across multiple security layers — such as endpoints, networks, servers, and cloud services — to detect, investigate, and respond to threats in a unified way. Think of it like a central security control room that watches your entire IT environment at once, spotting attacks that might be missed if you only looked at individual systems.
XDR (Extended Detection and Response)
43
dedicated hardware chip on a computer or device that securely stores cryptographic keys, passwords, and digital certificates, and performs hardware-based security functions. It’s like having a built-in safe in your computer that only the device can access, protecting critical secrets from malware or attackers.
TPM (Trusted Platform Module)
44
the process of checking and sanitizing user-supplied data before it is processed by an application to ensure it meets expected formats, types, and ranges. Prevents attacks like SQL injection, cross-site scripting (XSS), and buffer overflows. It’s like checking what someone writes on a form to make sure it’s safe and appropriate before doing anything with it
Input Validation
45
46
47