Security + flashcards

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/295

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:33 PM on 12/27/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

296 Terms

1
New cards
What are the four categories of security controls
Administrative controls, Technical controls, Physical controls, and Operational controls
2
New cards
What are examples of technical security controls
Firewalls, encryption, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and antivirus software
3
New cards
What are administrative security controls
Policies, procedures, Incident Response Plans (IRP), Business Continuity Plans (BCP), and data classification
4
New cards
What are physical security controls
Fences, cameras, gates, and guards
5
New cards
What are operational security controls
Controls performed by people that support and implement other security controls
6
New cards
What are the security control types by purpose
Preventive, deterrent, detective, corrective, compensating, recovery, and directive
7
New cards
What are preventive controls
Controls designed to stop security incidents before they occur
8
New cards
What are examples of preventive controls
Encryption, application filtering, and access control systems
9
New cards
What are deterrent controls
Controls intended to discourage attackers
10
New cards
What are examples of deterrent controls
Warning signs, cameras, and guards
11
New cards
What are detective controls
Controls that identify and record security events
12
New cards
What are examples of detective controls
Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM), and cameras
13
New cards
What are corrective controls
Controls that remediate issues after detection
14
New cards
What are examples of corrective controls
Backup and restore processes, Incident Response Plans (IRP), and Disaster Recovery Plans (DRP)
15
New cards
What are compensating controls
Alternative controls used when primary controls cannot be implemented
16
New cards
What are examples of compensating controls
Network segmentation and virtualization
17
New cards
What are recovery controls
Controls that restore systems and operations after an incident
18
New cards
What are examples of recovery controls
Backups, Disaster Recovery Plans (DRP), and Business Continuity Plans (BCP)
19
New cards
What are directive controls
Controls that direct user behavior
20
New cards
What are examples of directive controls
Acceptable Use Policy (AUP), password policy, and data classification policy
21
New cards
What is the CIA triad
Confidentiality, Integrity, and Availability
22
New cards
What is confidentiality
Ensuring data is accessible only to authorized users
23
New cards
What is integrity
Ensuring data remains accurate and unaltered during storage and transmission
24
New cards
What is availability
Ensuring authorized users have reliable and timely access to systems and data
25
New cards
What concepts support the CIA triad
Non repudiation, authenticity, accountability, and principle of least privilege
26
New cards
What is non repudiation
Ensuring users cannot deny actions they performed
27
New cards
What is authenticity
Verifying the legitimacy of users devices and data
28
New cards
What is accountability
Tracking and logging actions so users can be held responsible
29
New cards
What is the principle of least privilege
Granting only the minimum access necessary to perform job functions
30
New cards
What is authentication
The process of verifying the identity of a user or system
31
New cards
What are authentication factors
Something you know, something you have, something you are, somewhere you are, and something you do
32
New cards
What is authorization
Granting permissions to authenticated users
33
New cards
What is DAC
Discretionary Access Control where data owners determine access permissions
34
New cards
What is MAC
Mandatory Access Control where a central authority enforces access using security labels
35
New cards
What is RBAC
Role Based Access Control where permissions are assigned based on job roles
36
New cards
What is rule based access control
Access decisions made using predefined rules and conditions
37
New cards
What is AAA
Authentication Authorization and Accounting
38
New cards
What is authentication in AAA
Verifying the identity of a user or system
39
New cards
What is authorization in AAA
Granting or denying access permissions
40
New cards
What is accounting in AAA
Tracking and recording user activity for auditing and monitoring
41
New cards
What is RADIUS
Remote Authentication Dial In User Service
42
New cards
What is RADIUS used for
Centralized authentication authorization and accounting for network access
43
New cards
What ports does RADIUS use
UDP port 1812 for authentication and UDP port 1813 for accounting
44
New cards
What is 802.1X
A port based network access control standard
45
New cards
What is the purpose of 802.1X
To prevent unauthorized devices from accessing a network
46
New cards
What are the three components of 802.1X
Supplicant, Authenticator, and Authentication Server
47
New cards
What is a supplicant
The device attempting to connect to the network
48
New cards
What is an authenticator
The network device controlling access such as a switch or wireless access point
49
New cards
What is the authentication server
A server that validates credentials such as a RADIUS server
50
New cards
What is EAP
Extensible Authentication Protocol used to support multiple authentication methods
51
New cards
What is EAP used for
Providing flexible authentication methods within 802.1X
52
New cards
What authentication methods does EAP support
Passwords digital certificates tokens and biometrics
53
New cards
What is PEAP
Protected Extensible Authentication Protocol that uses an encrypted tunnel
54
New cards
What is EAP TLS
An EAP method that uses digital certificates for mutual authentication
55
New cards
What happens if 802.1X authentication fails
The port remains disabled and network access is denied
56
New cards
What happens if 802.1X authentication succeeds
The port is enabled and network access is granted
57
New cards
What is malware
Malicious software designed to damage disrupt or gain unauthorized access to systems
58
New cards
What are common types of malware
Virus worm trojan ransomware spyware rootkit and bot
59
New cards
What is a virus
Malware that attaches to legitimate files and requires user action to spread
60
New cards
What is a worm
Malware that self propagates without user interaction
61
New cards
What is a trojan
Malware disguised as legitimate software
62
New cards
What is ransomware
Malware that encrypts data and demands payment for decryption
63
New cards
What is spyware
Malware that secretly monitors user activity
64
New cards
What is a rootkit
Malware that provides persistent privileged access while hiding its presence
65
New cards
What is a bot
A compromised system controlled remotely as part of a botnet
66
New cards
What is a botnet
A network of compromised systems controlled by an attacker
67
New cards
What is a logic bomb
Malicious code triggered by a specific condition
68
New cards
What is fileless malware
Malware that runs in memory without writing to disk
69
New cards
What is a backdoor
A hidden method to bypass authentication
70
New cards
What are indicators of malware infection
Slow performance crashes pop ups unexpected network traffic
71
New cards
What is social engineering
Manipulating people into revealing information or performing actions
72
New cards
What is phishing
Deceptive messages designed to steal credentials or data
73
New cards
What is spear phishing
Targeted phishing aimed at a specific individual or organization
74
New cards
What is whaling
Phishing attacks targeting executives or high value individuals
75
New cards
What is vishing
Voice based phishing using phone calls
76
New cards
What is smishing
SMS based phishing using text messages
77
New cards
What is business email compromise (BEC)
Fraud using compromised or spoofed business email accounts
78
New cards
What is pretexting
Creating a fabricated scenario to obtain information
79
New cards
What is tailgating
Gaining physical access by following an authorized person
80
New cards
What is shoulder surfing
Observing someone enter credentials
81
New cards
What is threat actor
An individual or group that poses a security risk
82
New cards
What are common threat actor types
Script kiddie hacktivist insider organized crime and nation state
83
New cards
What is a script kiddie
An inexperienced attacker using existing tools
84
New cards
What is a hacktivist
An attacker motivated by political or social causes
85
New cards
What is an insider threat
A trusted individual who misuses access
86
New cards
What is an advanced persistent threat (APT)
A sophisticated long term attack often by nation states
87
New cards
What is attack surface
All possible points where an attacker can enter a system
88
New cards
What is attack vector
The path used to gain unauthorized access
89
New cards
What is a vulnerability
A weakness that can be exploited
90
New cards
What is a threat
A potential cause of harm
91
New cards
What is risk
The likelihood and impact of a threat exploiting a vulnerability
92
New cards
What is brute force attack
Repeated attempts to guess credentials
93
New cards
What is password spraying
Trying common passwords against many accounts
94
New cards
What is credential stuffing
Using leaked credentials from other breaches
95
New cards
What is dictionary attack
Using predefined word lists to guess passwords
96
New cards
What is denial of service (DoS)
An attack that disrupts availability
97
New cards
What is distributed denial of service (DDoS)
A DoS attack launched from multiple systems
98
New cards
What is on path attack
Intercepting traffic between communicating parties
99
New cards
What is man in the middle (MITM)
An attacker secretly intercepts and alters communications
100
New cards
What is replay attack
Capturing and reusing valid authentication data