ssett Set11.2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/137

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

138 Terms

1
New cards

Accountability

the ability to trace actions on a protected system back to a specific person

2
New cards

Non-repudiation

a security concept that ensures a user cannot deny having performed a transaction

3
New cards

Technical controls

the hardware and software components that protect a system against cyberattack

4
New cards

Administrative controls

security policies, standards, procedures, baselines (control)

5
New cards

OAuth 2.0

an authorization protocol, that grants access to a set of resources with access tokens

6
New cards

Two-Way Trust

Users in two domains can access resources in the other

7
New cards

One-Way Trust

Users in a trusted domain can access resources in the trusting domain, but not the other way around

8
New cards

Transitive trust relationships

trust flows upward through a domain tree as it is formed

9
New cards

identity proofing

The process of providing sufficient information (e.g., identity history, credentials, documents) to establish an identity

10
New cards

RFC (request for change)

starts formal change control process

11
New cards

CCB (change control board)

where an RFC is sent to

12
New cards

Privacy

providing a means of controlling information distribution

13
New cards

To keep people honest

why are locks used on doors?

14
New cards

Physical

what type of access control is the first line of defense?

15
New cards

Asset

anything required to complete a business task

16
New cards

Implicit deny

the security concept that all other concepts are based on

17
New cards

Logging

what TECHNICAL control is used to assess compliance?

18
New cards

Data declassification

what to do when data is no longer important to reduce security levels

19
New cards

Configuration management

used to track and manage assets and their relation to one another

20
New cards

Spiral model

uses a Plan-Do-Check-Act method before deployment

21
New cards

Application Programming Interface

API

22
New cards

Heigharchal Trust

trust based on the concept of a top entity that is trusted by all lower levels and entities

23
New cards

Need to know

Means by which granular control of objects is implemented in a MAC

24
New cards

Shibboleth

SSO system that uses SAML, defines auth on web pages

25
New cards

Subject Based AC

Attribute-based AC is also known as

26
New cards

Session Key (SK)

What does Kerberos use to validate user identity

27
New cards

OpenID Connect

What authenticates a users google account?

28
New cards

agent

program that performs services on behalf of another in another environment

29
New cards

Remote Auth Dial-In user service

RADIUS

30
New cards

Open Database Connectivity (ODBC)

interface language that is an API for databases

31
New cards

User entitlement

rights and privileges assigned to a user

32
New cards

Two accounts, an extra for special tasks

In regards to accounts, An administrator user should have ___

33
New cards

Confidentiality, Integrity, Non-Repudiation

What is provided with the WPS SOAP extension

34
New cards

Annualized Loss Expectancy

ALE

35
New cards

Cost of the Countermeasure

CCM

36
New cards

Exposure Factor (EF)

prediction to the percentage of loss from a threat to an asset

37
New cards

Simple Network Management Protocol (SNMP)

An SEIM retrieves event details using the _____ protocol

38
New cards

Open Vulnerability Assessment Language

OVAL

39
New cards

Signature

An entry in a database describing a violation used to match real time events to detect attacks

40
New cards

Speed

The ___ of notification is most important in regards to security findings

41
New cards

Level of response

Why is it important to consider the impact of a treat? To determine the __ ___ ___

42
New cards

Senior Management

Risk acceptance documents have to be signed by_____ ______

43
New cards

Management Information Base (MIB)

database used to interpret details of SNMP comms

44
New cards

0

Emergency code log #

45
New cards

1

Alert code log #

46
New cards

2

Critical code log #

47
New cards

3

Error code log #

48
New cards

4

Warning code log #

49
New cards

5

Notice code log #

50
New cards

6

Informational code log #

51
New cards

7

Debug code log #

52
New cards

Source System

Anything that records or maintains data of interest

53
New cards

Secret Key

The only way decryption can occur is with a ____

54
New cards

Binary

cryptographic keys are composed in ____

55
New cards

X.509

Certificate standard used with PKI

56
New cards

Serial numbers

How does a web of trust model provide security

57
New cards

Subjects pub key signed by CA priv key

How digital certs are created

58
New cards

Recovery point Objective (RPO)

Maximum data that can be lost before the business goes under

59
New cards

Key Space

Range of values that can be used to control symmetric encryption function

60
New cards

Cipher Suite

parameters set by Web browsers that define supported encryptions during TLS

61
New cards

Pretty Good Privacy (PGP)

gives email confidentiality through random symmetric keys and public keys, uses WoT

62
New cards

Key management Protocol

KMP

63
New cards

Digital Signatures

What does S/MIME use for integrity

64
New cards

Signature-based detection

detects incidents based on a collected sample of the activity

65
New cards

Integrity

The goal of a forensic investigator

66
New cards

Asymmetric

Encryption based on trap-door one-way functions

67
New cards

Human life

The highest concern with the disaster recovery plan

68
New cards

Write blocker

First step performed by forensic personnel? Connect the device to a _____

69
New cards

SSH and HTTPS

Allows secure access to a management console on a private network. ___ and ___

70
New cards

Tree

Topology that combines multiple network topologies

71
New cards

Malicious Mobile Code

Most significant threat when browsing the internet

72
New cards

Bandwidth throttling

limiting network traffic to make room

73
New cards

Bluesniffing

malicious attack using Bluetooth

74
New cards

Bluesmacking

Bluetooth-based DoS attack

75
New cards

Bluesnarfing

only Bluetooth attack that cannot be prevented by turning it off

76
New cards

12, 13, 14

only IEEE 802.11 2.4 GHz channels not allowed in US

77
New cards

A

5GHz, <54MBps: IEEE 802.11_

78
New cards

B

2.4GHz, <11MBps: IEEE 802.11_

79
New cards

G

2.4GHz, <54MBps: IEEE 802.11_

80
New cards

N

bothGHz, <600MBps: IEEE 802.11_

81
New cards

AC

5GHz, <500MBps: IEEE 802.11_

82
New cards

DoS

Installing a firmware update then stopping it is a form of a ___ attack

83
New cards

Routing Information Protocol

RIP

84
New cards

Open Shortest Path First

OSPF

85
New cards

Corporate-owned, personally enabled

COPE

86
New cards

Appliance

A pre-setup guest OS

87
New cards

Bus

Ethernet is always in the network topology of a ___

88
New cards

Mesh

Most fault-tolerant network topology

89
New cards

Thin client

Allows users to use a machine where all computing power is on a centralized server

90
New cards

Signature and Hash

Checking these to make sure the file is not malicious

91
New cards

Anti-spoofing

Router function that checks against an ACL

92
New cards

Z-wave

Wireless tech that uses mesh and central controller, normally in homes

93
New cards

Vlan

Created by a switch but needs a routing function to go between segments

94
New cards

VPN

Gives protection against eavesdropping and session hijacking

95
New cards

WPA3

Strongest network protocol and uses SAE and individualized data encryption

96
New cards

Host

H in HIDS

97
New cards

Stateful inspection firewall

can discard TCP segments

98
New cards

FIN flag

Used to start the graceful shutdown of a session

99
New cards

Proxy

Border device used for NAT and content caching

100
New cards

X

Standard Implemented on a WAP to eliminate password guessing attacks: IEEE 802.11_