security +

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/158

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

159 Terms

1
New cards
2
New cards
3
New cards
  1. What are technical security controls

Controls implemented through technology such as firewalls, encryption, IDS, and access controls.

4
New cards
  1. What are managerial security controls

Strategic controls involving risk assessments, policies, training programs, and vendor management.

5
New cards
  1. What are operational security controls

Day-to-day security procedures like backup processes, incident response, and change management.

6
New cards
  1. What are physical security controls

Tangible measures like guards, fences, CCTV, biometric locks, and fire suppression.

7
New cards
  1. What are preventive controls in security

Measures taken to stop security incidents before they occur (e.g., firewalls, encryption).

8
New cards
  1. What are deterrent security controls

Measures to discourage attackers, such as warning banners or visible cameras.

9
New cards
  1. What are detective security controls

Controls that identify and alert on security incidents, like IDS and SIEM systems.

10
New cards
  1. What are corrective controls

Post-incident measures like antivirus tools, backup/restoration, and patching.

11
New cards
  1. What are compensating controls

Alternative controls used when primary security methods are not feasible.

12
New cards
  1. What are directive security controls

Policies and procedures that guide user actions to ensure secure behavior.

13
New cards
  1. What is the CIA triad

Confidentiality, Integrity, Availability – the core goals of information security.

14
New cards
  1. What is non-repudiation in security

Ensures that a sender cannot deny sending a message and the receiver cannot deny receiving it.

15
New cards
  1. What is AAA in cybersecurity

Authentication, Authorization, Accounting – key components of identity management.

16
New cards
  1. What is zero trust security

A model that assumes no implicit trust and continuously verifies identities and context.

17
New cards
  1. What is a honeypot

A decoy system designed to attract and monitor attackers.

18
New cards
  1. What is tokenization

Replacing sensitive data with non-sensitive equivalents to reduce risk.

19
New cards
  1. What is key escrow

A trusted third party holds encryption keys for recovery or legal access.

20
New cards
  1. What is hashing used for

Ensuring data integrity by generating a fixed-size value from input data.

21
New cards
  1. What is a digital signature

A cryptographic method to verify the authenticity of digital messages or documents.

22
New cards
  1. What is a certificate authority (CA)

An entity that issues digital certificates to verify identities online.

23
New cards

What is a nation-state actor

A government or affiliated group engaging in cyber operations, often for espionage or warfare.

24
New cards

Who are unskilled attackers (script kiddies)

Individuals with limited knowledge using pre-made tools to launch attacks.

25
New cards

What motivates hacktivists

Political, ethical, or social causes.

26
New cards

What defines an insider threat

An employee or contractor who misuses access to harm the organization.

27
New cards

What is shadow IT

Unauthorized technology used by employees without IT department approval.

28
New cards

What are typical motivations for cyber attacks

Financial gain, revenge, ideology, espionage, disruption, or ethical duty.

29
New cards

What are threat vectors

Pathways through which threats exploit vulnerabilities.

30
New cards

What are message-based threat vectors

Vectors using email, SMS, or messaging platforms to deliver attacks like phishing.

31
New cards

What is a watering hole attack

Compromising a website to infect visitors from a targeted group.

32
New cards

What is typosquatting

Using misspelled domain names to deceive users.

33
New cards

What are attack surfaces

Points in a system or network vulnerable to attack, including people, devices, and apps.

34
New cards

What are application vulnerabilities

Flaws in apps like buffer overflows, TOC/TOU issues, and malicious updates.

35
New cards

What are cloud-specific vulnerabilities

Issues like misconfigured storage, insecure APIs, and data exposure in cloud environments.

36
New cards

What is a zero-day vulnerability

An unknown and unpatched flaw actively exploited before vendor awareness.

37
New cards

What is a race condition

An issue where system behavior depends on event timing, leading to exploits.

38
New cards

What are virtualization vulnerabilities

Flaws like VM escape that allow interaction with host systems.

39
New cards

What indicates a malware attack

System slowdowns, unauthorized access, strange processes, or encryption notes (ransomware).

40
New cards

What are signs of a keylogger

Unexpected input logs, strange file behavior, or unauthorized data transmissions.

41
New cards

What are signs of a DDoS attack

Massive network traffic, slow service response, or complete outages.

42
New cards

What is privilege escalation

When a user gains access rights beyond their authorization level.

43
New cards

What is a logic bomb

Malware triggered by specific conditions or dates.

44
New cards

What is network segmentation

Dividing networks into zones to limit lateral movement during breaches.

45
New cards

What is an access control list (ACL)

A table specifying which users or systems can access resources and how.

46
New cards

What is application allowlisting

Permitting only approved apps to run on a system to reduce risk.

47
New cards

What is system isolation

Keeping systems or apps separate to contain breaches.

48
New cards

Why is encryption used

To ensure confidentiality by making intercepted data unreadable without the key.

49
New cards

What is patching in cybersecurity

Updating systems to fix vulnerabilities and prevent exploits.

50
New cards

What is the role of monitoring in security

Continuously observing systems to detect and respond to threats.

51
New cards

Perfect! Here's the next set of flashcards, continuing from #49

52
New cards
53
New cards

54
New cards
55
New cards
  1. What is the shared responsibility model in cloud computing

Cloud providers manage the infrastructure, while the customer is responsible for securing data and applications.

56
New cards
  1. What is the implication of Infrastructure as Code (IaC)

Automation boosts efficiency but can quickly propagate vulnerabilities if not properly managed.

57
New cards
  1. What security concern is related to serverless architecture

Increased reliance on third-party services which may introduce new risks.

58
New cards
  1. What does microservices architecture improve

Isolation, which helps limit breach scope.

59
New cards
  1. What is physical isolation in network infrastructure

An air-gapped system not connected to external networks to reduce threats.

60
New cards
  1. How does SDN (Software Defined Networking) impact security

Increases flexibility but requires careful configuration to avoid vulnerabilities.

61
New cards
  1. What is a demilitarized zone (DMZ) in networking

A buffer zone for public-facing services separated from internal networks.

62
New cards
  1. What is the purpose of minimizing an attack surface

To reduce potential points of entry for attackers.

63
New cards
  1. What is a fail-open system

Defaults to allowing traffic when security systems fail—used when availability is critical.

64
New cards
  1. What’s the difference between active and passive devices

Active devices interact with traffic (e.g., firewalls); passive devices monitor (e.g., IDS).

65
New cards
  1. What is regulated data

Data governed by laws and regulations, such as HIPAA or GDPR.

66
New cards
  1. What are the three states of data

Data at rest, data in transit, and data in use.

67
New cards
  1. What is data masking

Replacing real data with fictional data to protect privacy during testing or analytics.

68
New cards
  1. What is data tokenization

Replacing sensitive data with a non-sensitive equivalent token.

69
New cards
  1. What is data sovereignty

The concept that data is subject to the laws of the country in which it is stored.

70
New cards
  1. What is high availability in security architecture

Ensuring systems remain accessible with minimal downtime.

71
New cards
  1. What is the difference between a hot and cold site

A hot site is fully equipped and operational, while a cold site has minimal setup.

72
New cards
  1. What is geographic dispersion in disaster recovery

Placing backup sites in different regions to avoid single-point failure.

73
New cards
  1. What is the purpose of failover testing

Ensures backup systems activate when the primary system fails.

74
New cards
  1. What is snapshotting in data recovery

Capturing the system state at a specific time for restoration.

75
New cards
  1. What is a secure baseline

A defined set of secure configurations applied to systems.

76
New cards
  1. What is system hardening

Reducing vulnerabilities by removing unnecessary services and applying security controls.

77
New cards
  1. What is MDM (Mobile Device Management)

Software used to monitor and secure employee mobile devices.

78
New cards
  1. What is WPA3

A more secure wireless encryption standard for Wi-Fi networks.

79
New cards
  1. What are site surveys and heat maps used for

Determining optimal wireless device placement and signal strength coverage.

80
New cards
  1. What is asset classification

Categorizing assets based on sensitivity (e.g., public, confidential) to apply suitable security controls.

81
New cards
  1. What is the purpose of asset inventory

Maintaining a current list of hardware/software to ensure visibility and control over the environment.

82
New cards
  1. Why is asset disposal important

To ensure data is securely removed or destroyed to prevent leakage or unauthorized access.

83
New cards
  1. What is asset enumeration

The process of scanning and listing all devices on a network for visibility and control.

84
New cards
  1. What role does vendor trustworthiness play in procurement

Helps avoid counterfeit or vulnerable components.

85
New cards
  1. What is a vulnerability scan

Automated tool that checks systems for known security flaws.

86
New cards
  1. What is static application analysis

Examining code without running it to detect vulnerabilities.

87
New cards
88
New cards

You're on a roll! Here's the next batch, #81 to #120, fully formatted

89
New cards
90
New cards

91
New cards
92
New cards
  1. What is dynamic application analysis

Running the application to observe behavior and identify runtime vulnerabilities.

93
New cards
  1. What is a penetration test

Simulated attack to evaluate system defenses.

94
New cards
  1. What is a bug bounty program

A program where researchers are rewarded for reporting security bugs.

95
New cards
  1. What is a false positive in vulnerability analysis

A flagged issue that turns out to be non-threatening.

96
New cards
  1. What is log aggregation

Collecting logs from different systems into one place for analysis.

97
New cards
  1. What does alert tuning do

Adjusts alert settings to reduce false positives and improve accuracy.

98
New cards
  1. What is file integrity monitoring

Detects unauthorized changes to critical files.

99
New cards
  1. What is SIEM

Security Information and Event Management – real-time threat detection and analysis system.

100
New cards
  1. What is SCAP

A protocol for standardizing vulnerability management and policy compliance.