2.1 Logical Security Flashcards

(20 cards)

1
Q

What is the principle of least privilege?

A

Granting users and applications only the minimum permissions necessary to perform their tasks.

This principle helps to enhance security by limiting access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is the principle of least privilege important?

A

It limits potential damage from malware, errors, or unauthorized access.

By restricting permissions, the risk of exploitation is minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Zero Trust security model?

A

A model that assumes no user, device, or application is trusted by default, even inside the network.

This approach enhances security by verifying every access request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is required in a Zero Trust environment?

A

Continuous authentication and authorization for every access request.

This ensures that trust is never assumed and must be verified constantly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Access Control List (ACL)?

A

A set of rules that allows or denies network traffic based on criteria like IP address, port, or protocol.

ACLs are essential for managing network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where are ACLs commonly used?

A
  • On routers
  • On firewalls
  • On systems to control access and network traffic

They play a crucial role in network security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Multifactor Authentication (MFA)?

A

A security method that requires two or more forms of identity verification.

MFA significantly enhances security by requiring multiple proofs of identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the categories of authentication factors in MFA?

A
  • Something you know
  • Something you have
  • Something you are
  • Somewhere you are

These categories help to strengthen the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is MFA more secure than single-factor authentication?

A

It requires multiple independent proofs of identity, reducing the risk of unauthorized access.

This layered approach enhances overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does email authentication work as an MFA method?

A

A verification code or link is sent to a user’s email to confirm identity.

This method adds an additional layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is email-based authentication considered weaker MFA?

A

Because email accounts can be compromised and are often protected by the same credentials being verified.

This vulnerability can lead to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is token generation in MFA?

A

The use of apps or hardware devices to generate time-based or random authentication codes.

Token generation enhances security by providing unique codes for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of token generation tools?

A
  • Mobile authenticator apps
  • Physical hardware token devices

These tools are widely used for secure authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does SMS or phone call authentication work?

A

A one-time code is sent via text message or voice call to verify identity.

This method is commonly used for two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the security risks of SMS-based authentication?

A

It is vulnerable to social engineering, SIM swapping, and message interception.

These risks can compromise the security of the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Time-based One-Time Password (TOTP)?

A

A code generated using a shared secret and synchronized time that changes at regular intervals (e.g., every 30 seconds).

TOTP is a secure method for generating temporary passwords.

17
Q

What is an example of an application that uses TOTP?

A

Authenticator apps like Google Authenticator or similar mobile apps.

These apps provide a convenient way to generate TOTP codes.

18
Q

What is a One-Time Password (OTP)?

A

A code that can be used only once and then becomes invalid.

OTPs enhance security by preventing reuse of authentication codes.

19
Q

How does OTP differ from TOTP?

A

OTP codes are single-use and not necessarily time-synchronized, while TOTP codes are time-based and periodically change.

This distinction affects how each type of password is generated and used.

20
Q

Why are OTPs considered secure?

A

Because each code is valid only once, reducing the risk of reuse or interception.

This feature makes OTPs a reliable method for authentication.