Cyber exam two

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/156

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:30 PM on 4/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

157 Terms

1
New cards

What is Access Control

determines who can access resources and how

2
New cards

What is Mandatory Access control (MAC)

access based on classification levels, strict,

3
New cards

What is Discretionary access control (DAC)

Owner decides access

4
New cards

what is Role based access control (RBAC)

access based on job roles

5
New cards

what is task-based access control (TBAC)

access based on tasks

6
New cards

what is attribute based access control (ABAC)

access based on attributes(user/system/enviroment)

7
New cards

what is lattice based access control (LBAC)

uses a matrix of permissions

8
New cards

what are the 4 functions of access control?

identification, authentication, authorization, accountability

9
New cards

What is identification

claiming identitiy (username)

10
New cards

what is authentication

something you know(password), something you have(token), something you are (biometric)

11
New cards

what is authorization

what you're allowed to do

12
New cards

What is accountability

tracking actions (logs/audits)

13
New cards

what are biometrics

unique identifiers: fingerprint, retina, iris, dna

14
New cards

what is the false reject rate (FRR)

rejects valid user

15
New cards

what is false accept rate (FAR)

accepts invalid user

16
New cards

what is crossover error rate (CER)

Where FRR and FAR meet

17
New cards

what is a firewall

hardware/software that filters network traffic based on rules

18
New cards

what is a hybrid firewall

combines multiple firewall types

19
New cards

what is a NGFW( Next gen firewall)

advanced filtering + threat detection

20
New cards

What is Unified Threat Managment

All in one security device

21
New cards

what is a Bastion host

single exposed defence system

22
New cards

what is a dual homed host

two network interfaces

23
New cards

what is a screened host

router +firewall combo

24
New cards

what is a screened subnet (DMZ)

most secure, separates public/internal networks

25
New cards

what are the best firewall practices?

allow outbound traffic, block direct public access, block ICMP (ping), use DMZ for web services, deny unverified traffic, block Telnet from outside

26
New cards

what is content filters

restrict access to certain websites/content and use to block non-business or harmful sites

27
New cards

what is a war dialer

finds dial up connections

28
New cards

what is RADIUS

central authentication server

29
New cards

what is TACACS

Centralized authentication system

30
New cards

what is kerberos

uses encryption and tickets for authentication

31
New cards

What is a VPN

secure connection over public network

32
New cards

what is a trusted VPN

has dedicated lines

33
New cards

what is a secure VPN

internet and encryption

34
New cards

what is a hybrid VPN

combination

35
New cards

what is Transport mode for VPN

encrypts data only

36
New cards

what is tunnel mode for a VPN

encrypts entire packet

37
New cards

what is plaintext

original data

38
New cards

what is ciphertext

encrypted data

39
New cards

what is algortihm

encryption method

40
New cards

what is cryptology/cryptography

ology- study of encryption, ography- creating codes

41
New cards

block cipher

encrypts data in blocks

42
New cards

stream cipher

encrypts bit by bit

43
New cards

monoalphabetic vs polyalphabetic

1 alphabet vs multiple alphabets

44
New cards

What is a Vigenère cipher?

advanced polyalphabetic

45
New cards

what is a transposition cipher

rearranges data

46
New cards

what is the System development life cycle

method for building systems. phases: invesitagtion, analysis, logical design, physical design, implementation

47
New cards

security design principles

least privilege, separation of privilege, fail-safe defaults, economy of mechanism, open design

48
New cards

what is the work breakdown structure

breaks project into tasks: tasks, people, timeline, cost, dependencies

49
New cards

what is a direct conversion strategy

immediate switch

50
New cards

what is a phased conversion strategy

gradual change

51
New cards

what is the pilot conversion strategy

test version first

52
New cards

what is the parallel convesrion strategy

old and new together

53
New cards

what is the bulls eye model

1. policies, 2. networks, 3. systems, 4. applications

54
New cards

what is the Lewin model

unfreezing, moving, refreezing

55
New cards

what is security maintenance

continuous monitoring and updates: adjust for new threats, employees, systems

56
New cards

what is a vulnerability assessment

find weaknesses

57
New cards

what is pen testing

simulate attacks

58
New cards

what are risk responses

accept, transfer mititgate

59
New cards

what is physcial secutiy

protects physical assets from unauthrotized access

60
New cards

what is intrusion

unauthorized access attempt

61
New cards

what is detection

identifying attack

62
New cards

what is prevention

stopping attack

63
New cards

What is a reaction?

responding

64
New cards

what is correction

fixing damage

65
New cards

what is NIDPS

Network based IDPS

66
New cards

What is IDPS process model

Information Sources, Analysis, Response

67
New cards

What is a HIDPS?

host based IDPS

68
New cards

What is a network behavior analysis

Network Behavior Analysis (NBA) is a cybersecurity technique that monitors and analyzes network traffic to detect anomalies and potential security threats.

69
New cards

what is signature based detection methods

looks for known attack patterns, fast but cant detect new threats

70
New cards

what is anomaly based detection methods

detects unusual behavior, can catch new attacks, more false positives

71
New cards

what is stateful protocol analysis

understands how protocols should behave, detects abnormal usage, deep packet inspection

72
New cards

what is SIEM (Security Information and Event Management)

collects and analyzes security data, helps detect and respond to threats, the central brain of security monitoring, (example: login failed 50 times + unusal IP = alert)

73
New cards

what is cryptanalysis

breaking codes

74
New cards

XOR encryption

same bits -> 0 different bits ->1

75
New cards

Hashing

Process of converting data into a fixed-size value, used for passwords and integrity checks

76
New cards

Symmetric Encryption

An encryption method whereby the same key is used to encode and to decode the message, fast but risky, private key

77
New cards

Asymmetric Encryption

two keys are used; one key encodes the message, and the other key decodes the message, one public one private, slower but more secure

78
New cards

what replaced the data encryption standard

advances encryption standard

79
New cards

bigger key = ____ security

stronger

80
New cards

security is ongoing not one time, it must adapts to what three things

new threats

new systems

organizational changes

81
New cards

security maintenance model

External monitoring

Internal monitoring

Planning and risk assessment

Vulnerability assessment and remediation

Readiness and review

82
New cards

what are all the access control approaches

MAC, DAC, RBAC, TBAC, ABAC, LBAC

83
New cards

what are the 4 functions of access control

identification, authentication, authorization, accountability

84
New cards

what are the firewall processing modes

packet filtering, application proxy, circuit gateway, MAC layer, Hybrid

85
New cards

what are the firewall selection factors

1. (protection)

2. cost

security level, ease of configuration, scalability, staff expertise

86
New cards

packet-filtering firewall

examines each part of a message and determines whether to let that part pass

87
New cards

Application Proxy Firewall

An advanced firewall that processes all traffic between two systems. Instead of allowing a direct connection between two systems, the proxy connects to each system separately and passes filtered traffic to the destination based on filtering rules.

88
New cards

Circuit gateway firewall

Creates tunnels connecting specific processes or systems on each side of the firewall, and allow only authorized traffic in the tunnel.

89
New cards

MAC Layer Firewalls

Designed to operate at media access control sublayer of network's data link layer

90
New cards

Hybrid Firewalls

Combine elements of other types of firewalls, that is, elements of packet filtering and proxy services, or of packet filtering and circuit gateways

91
New cards

What is the most important firewall architecture

screened subnet(DMZ)

92
New cards

What is Kerberos?

authentication system using tickets and encryption and uses third party authentication server

93
New cards

What is the purpose of IDPS, intrusion Detection and Prevention System

detect attacks, prevent attacks, respond to attacks, restore systems. (think: detect,stop,fix)

94
New cards

IDPS Components

detection, prevention,reaction, correction, response

95
New cards

why should you use idps

detect attacks early, prevent damage, provide logs/evidence, improve security

96
New cards

advantages of HIDPS

sees encrypted traffic, detects local attacks

97
New cards

Disadvantages of HIDPS

uses resources, hard to manage, slows system

98
New cards

what does public key infrastucture provide

authentication, integrity, confidentiality, nonrepudiation

99
New cards

what are the differences in digital signature and digital certificate

signature- proves sender, certificate- verifies identitiy

100
New cards

what are the sdlc phases in order

1. investigation 2. analysis 3. logical design 4. physical design 5. Implementation 6. Maintenance