1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which describes technical security controls?
Sometimes called logical security controls, Executed by computer systems (instead of people), Implemented with technology
Which are examples of technical security controls? (not preventative)
Encryption, IDSs, Firewalls (not preventative)
Examples of managerial security controls include:
Organizational security policy, Security awareness training, Risk assessments
Examples of operational security controls?
Configuration management, System backups, Patch management
Which of the following examples do NOT fall into the category of physical security controls?
Data backups, Firewalls, Asset management
What are the examples of preventive security controls? (not technical)
Encryption, Firewalls, AV software (not technical)
AV Software
Anti-virus software
IDS
Intrusion Detection System
Which refer to detective security control?
Log monitoring, Security audits, CCTV, IDS, Vulnerability scanning
Which refers to corrective security control?
Recovering data from backup copies, applying software updates and patches to fix vulnerabilities, developing and implementing IRPs to respond to and recover from security incidents, activating and executing DRPs to restore operations after a major incident
Which are compensating security controls?
Backup power systems, MFA, Application sandboxing, Network segmentation
IRP
Incident Response Plan
AUP
Acceptable Use Policy
What does non-repudiation prove?
proves who did something and what was done. does NOT hide contents
TACACS+
Terminal Access Controller Access Control System Plus - Cisco protocol that fully supports AAA. Separates each function for granular control.
RADIUS
Remote Authentication Dial-In User Service. Open standard protocol. Supports AAA but combines authentication and authorization.
CHAP
Challenge-Handshake Authentication Protocol. Only provides authentication. Doesn’t support AAA.
PAP
Password Authentication Protocol. Basic, insecure authentication only. Doesn’t support AAA.
MS-CHAP
Microsoft’s version of CHAP. Adds encryption but still only handles authentication. Doesn’t support AAA.
Which refer to common methods of device authentication used within the AAA framework?
Digital certificates, IP addresses, MAC addresses