Access Controls
Cryptography
Standards & Compliance
Auditing, Testing, & Monitoring
Security Operations & Administration
100

What are the 4 elements of Access Control?

Identification, Authentication, Authorization, Accountability

100

An algorithm that encrypts or decrypts data.

Cipher

100

The US standards organization whos purpose is to develop cybersecurity standards, guidelines, and best practices to improve information security.

NIST (National Institute of Standards and Technology)

100

The process of ensuring computer environments and security controls are working as expected.

Auditing

100

What terms is the actions of the security administration to plan, design, implement, and monitor an organizations environment.


Security Operations

200

The access control method where the resource owner decides who can access the resource.

Discretionary Access Control

200

A cryptographic function that maps an input of any size to a unique, fixed, irreversible output. 

Hash Function

200

What standard protects credit card and payment data?

Payment Card Industry Data Security Standard (PCI DSS)

200

What are setting baselines, alarms, CCTVs, and honeypots techniques for?

Monitoring

200

The iterative method of software development focused on short-term sprints.

Agile development

300

The access control method where the resource owner determines the sensitivity level of the resource and a central system determines who and when it can be accessed.

Mandatory Access Control

300

A function of cryptography that prevents an entity from denying an action.

Nonrepudiation

300

What are 3 requirements of the Family Educational Rights and Privacy Act (FERPA)? (1OO/ans)

1. Control access to student records

2. Allow students to review and correct records

3. Require consent before disclosure

300

This security tool monitors hosts and stops malicious activity when detected.

HIPS (Host-based Intrustion Prevention System)

300

An advanced SIEM utilized by the SOC. (x2 for the acronym)

SOAR

400

The authentication technology that allows a single authentication event to provide access to multilple services. 

Single Sign On (SSO)

400

In Asymmetric cryptography, what is the key used for both digitally signing a message as well as decrypting a message. 

Private key

400

What regulation requires personal data and privacy protection of EU citizens?

General Data Protection Regulation (GDPR)

400

The testing method where the penetration tester knows all information about the environment.

White box testing

400

Name 4 operations the Security Administartion may be responsible for?

Access Control, Documentation, IT Security Policies, Disaster Assessment & Recovery, Security Outsourcing, Compliance, Data Classification

500

What are the 5 general methods of Authentication? (100/ans)

Authentication by:

Knowledge, Ownership, Characteristics, Actions, Location

500

A method of secure key exchange that utilizes both symmetric and asymmetric cryptography.

Diffie-Hellman Key Exchange

500

What standard dual created by ISO and IEC provides the best practice implementation of selecting, implementing, and managing InfoSec controls.

ISO/IEC 27002

500

What are five network mapping methods? (100/ans)

1. Ping Sweeps – Identify live hosts

2. Port Scanning – Identify open ports/services

3. Service Enumeration – Determine versions/services

4. System Fingerprinting – Determine the OS of systems

5. Topology Mapping – Understand network layout

500

What are the 5 steps of change management?

Request > Impact Assessment > Approval > Building/Testing > Implementation