Security Techniques Flashcards

(37 cards)

1
Q

What is the primary goal of security techniques in computing resources?

A

Protecting digital assets from evolving cyber threats

Security techniques range from traditional to advanced methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the key areas of application security.

A
  • Input validation
  • Secure cookies
  • Static and dynamic code analysis
  • Code signing
  • Sandboxing

These areas aim to prevent, detect, and remediate security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does NAC stand for in network security?

A

Network Access Control

NAC protects networks by assessing the security status of devices before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false: WPA3 is the latest and most secure wireless security protocol.

A

TRUE

WPA3 introduces new features for enhanced security, including simultaneous authentication of equals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: WPA2 uses the _______ protocol for stronger encryption.

A

AES

AES stands for Advanced Encryption Standard, which is used in WPA2 for secure wireless communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the types of web filtering techniques mentioned?

A
  • Agent-Based Web Filtering
  • Centralized Proxy
  • URL Scanning
  • Content Categorization
  • Block Rules
  • Reputation-Based Filtering

These techniques help control or restrict internet content access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of input validation in application security?

A

Ensures applications process well-defined, secure data

It guards against attacks exploiting data input vulnerabilities like SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does DMARC stand for in email security?

A

Domain-based Message Authentication, Reporting and Conformance

DMARC helps detect and prevent email spoofing by setting policies for email handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the protocols used for email security.

A
  • DKIM
  • SPF
  • DMARC

These protocols protect email content and accounts from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of RADIUS in network security?

A

Offers Authentication, Authorization, and Accounting services

RADIUS is widely used for secure access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the significance of Wireless Access Point (WAP) placement?

A

Influences network range, coverage, and security

Proper placement prevents unauthorized access by limiting signal leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of interference that can affect Wireless Access Points?

A
  • Co-Channel Interference
  • Adjacent Channel Interference

These interferences occur when multiple WAPs use the same channels or overlapping frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does EAP stand for in authentication protocols?

A

Extensible Authentication Protocol

EAP supports multiple authentication methods and provides common functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of sandboxing in application security?

A

Isolates running programs to limit access to resources

Sandboxing prevents harmful actions on the host device or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: WEP stands for _______.

A

Wired Equivalent Privacy

WEP was introduced in 1999 and is considered insecure due to its weak encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the benefits of DKIM in email security?

A
  • Email authentication
  • Protection against email spoofing
  • Improved email deliverability
  • Enhanced reputation score

DKIM adds a digital signature to email headers for integrity verification.

17
Q

What is the purpose of static code analysis (SAST)?

A

Identifies issues like buffer overflows and SQL injection before running the program

SAST is important for proper input validation in both front-end and back-end code.

18
Q

What does AAA stand for in network security?

A

Authentication, Authorization, and Accounting

AAA protocols are important for centralized user authentication and access control.

19
Q

What is the function of email gateways?

A

Facilitate secure and efficient email transmission

Email gateways handle routing, security, policy enforcement, and encryption.

20
Q

What is a Cloud-Based Email Gateway?

A

Hosted by third-party cloud service providers, providing scalability but limited control over configurations

This type of gateway allows organizations to leverage cloud resources for email security.

21
Q

What is a Hybrid Email Gateway?

A

Combines on-premises and cloud-based gateways for a balance between control and convenience

This approach allows organizations to utilize both local and cloud resources.

22
Q

What is the purpose of Spam Filtering?

A

Detects and prevents unwanted and unsolicited emails from reaching users’ inboxes

Techniques include content analysis, Bayesian filtering, DNS-based sinkhole list, and email filtering rules.

23
Q

Name the techniques used in Spam Filtering.

A
  • Content analysis
  • Bayesian filtering
  • DNS-based sinkhole list
  • Email filtering rules

These techniques help identify and manage spam emails.

24
Q

What does Endpoint Detection and Response (EDR) focus on?

A

Monitoring endpoint and network events and recording the information in a central database

EDR continuously monitors for advanced threats.

25
What are the key functions of **EDR**?
* Analysis * Detection * Investigation * Reporting * Alerting ## Footnote These functions enhance security monitoring and incident response.
26
How does **EDR** work?
* Data Collection * Data Consolidation * Threat Detection * Alerts and Threat Response * Threat Investigation * Remediation ## Footnote These steps outline the process of detecting and responding to threats.
27
What is **File Integrity Monitoring (FIM)**?
Validates the integrity of operating system and application software files by comparing their current state with a known, good baseline ## Footnote FIM helps identify unauthorized changes to critical files.
28
What is **Extended Detection and Response (XDR)**?
Integrates multiple protection technologies into a single platform ## Footnote XDR improves detection accuracy and simplifies incident response.
29
What is the difference between **EDR** and **XDR**?
* EDR: Focused on endpoints * XDR: Comprehensive solution including endpoints, networks, cloud, and email ## Footnote XDR integrates multiple protection technologies for broader threat detection.
30
What is **User Behavior Analytics (UBA)**?
Uses big data and machine learning to analyze user behaviors for detecting security threats ## Footnote UBA focuses on understanding user behavior to identify patterns and anomalies.
31
What does **User and Entity Behavior Analytics (UEBA)** extend to?
Monitors entities like routers, servers, and endpoints in addition to user accounts ## Footnote UEBA enhances security by analyzing both user and entity behavior.
32
What are the key aspects of **UBA** and **UEBA**?
* Establishing normal behavior baselines * Identifying deviations from normal behavior * Generating alerts for anomalies ## Footnote These aspects help in early detection of security threats.
33
What are **secure protocols**?
Protocols that protect data in transit from unauthorized access ## Footnote Examples include HTTPS, SFTP, and SSH.
34
What is the difference between **HTTP** and **HTTPS**?
HTTP transmits in plaintext; HTTPS uses encryption ## Footnote Always use the encrypted version for secure data transmission.
35
What are the categories of **ports**?
* Well-known ports (0-1023) * Registered ports (1024-49151) * Dynamic/private ports (49152-65535) ## Footnote Port numbers indicate whether a protocol is secure.
36
What is **TCP (Transmission Control Protocol)**?
Connection-oriented, ensuring data delivery without errors ## Footnote Ideal for applications where data accuracy is crucial.
37
What is **UDP (User Datagram Protocol)**?
Connectionless and faster, but doesn't guarantee data delivery ## Footnote Suitable for applications prioritizing speed over accuracy.