Shared Flashcard Set

Details

Security+
Security+ Certification
528
Computer Science
Not Applicable
04/17/2017

Additional Computer Science Flashcards

 


 

Cards

Term
What is Risk Assessment?
Definition
The process of identifying the threats, vulnerabilities and impact of a loss of data or the ability to process the data.
Term
Other names for Risk Assessment?
Definition
Risk Analysis and Risk Calculation
Term
What is ALE?
Definition
Annual Loss Expectancy - monetary measure of the loss that could be expected in a year.
Term
What is SLE?
Definition
Single Loss Expectancy - monetary measure of a one time loss.
Term
What is AV?
Definition
Asset value - part of SLE. The actual value of what is at risk.
Term
What is EF?
Definition
Exposure Factor - part of SLE. What is the real threat of losing the asset.
Term
What is ARO?
Definition
Annualized Rate of Occurrence - likelihood of an event occurring within a year.
Term
What is the formula for Risk Impact Calculation?
Definition
ALE = SLE * ARO
Term
What are the 3 tiers of risk management?
Definition
Tier 1: organization level
Tier 2: mission/business process level
Tier 3: information system level
Term
What does ISO stand for?
Definition
International Organization for Standardization
Term
What does IEC stand for?
Definition
International Electrotechnical Commission
Term
What does FISMA stand for?
Definition
Federal Information Security Management Act
Term
What is NIST's responsibility?
Definition
NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems
Term
What does OMB stand for?
Definition
Office of Management and Budget
Term
What is included in a risk management process?
Definition
1. Framing risk
2. Assessing risk
3. Responding to risk
4. Monitoring risk
Term
What is risk?
Definition
Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence
Term
What does NIST stand for?
Definition
National Institute for Standards and Technology
Term
Name the 3 types of controls identified by NIST to respond to risk.
Definition
- Management
- Operational
- Technical
Term
List the Management Control Type responsibilities
Definition
- Risk Assessment
- Planning
- System and Services Acquisition
- Certification, Accreditation and Security Assessment
Term
List the Operational Control Type responsibilities
Definition
- Personal Security
- Physical and Environmental Protection
- Contingency Planning
- Configuration Management
- Maintenance
- System and Information Integrity
- Media Protection
- Incident Response
- Awareness and Training
Term
List the Technical Control Type responsibilities
Definition
- Identification and Authentication
- Access Control
- Audit and Accountability
- System and Communication Protection
Term
What is Risk Management?
Definition
The on-going process of being prepared to deal with a situation when a risk becomes and event.
Term
What does BIA stand for?
Definition
Business Impact Analysis
Term
What are the 4 components of BIA?
Definition
- Identify Critical Functions
- Prioritize Critical Business Functions
- Calculate a Time Frame for Critical Systems Loss
- Estimate the Tangible and Intangible Impact on the Organization.
Term
What are the 3 A's
Definition
- Authorization
- Authentication
- Access
Term
What is Authentication?
Definition
The process of determining is someone or something is, in fact, who or what it is declared to be.
Term
Of the 3 A's, which is the process of verifying the identification?
Definition
Authentication
Term
What is Authorization?
Definition
The process of determining what a particular identity is allowed to do.
Term
What is Access?
Definition
The method to allow or deny access to various resources based on Authentication and Authorization.
Term
Which "A" determines "who"?
Definition
Authentication
Term
Which "A" determines "what"?
Definition
Authorization
Term
Which "A" determines "how"?
Definition
Access
Term
What are 5 ways of authentication?
Definition
1. Something you know (aka password)
2. Something you have (CAC)
3. Something you do (action on screen)
4. Something you are ... location
5. Something you are ... finger prints
Term
What are the 3 main types of authentication?
Definition
1. Single factor
2. Mutual
3. Multi-factor
Term
What does SFA stand for?
Definition
Single Factor Authentication
Term
Give an example of SFA.
Definition
username/password
Term
What is Mutual Authentication?
Definition
When a server is authenticated in addition to the user.
Term
What is Multi-factor Authentication?
Definition
When 2 or more authentication methods are used.
Term
What 2 objects does an OS use to enforce network and resource access?
Definition
- ACL
- security tokens
Term
What does ACL stand for?
Definition
Access Control List
Term
(T/F) A security token contains the rights and access privileges of a user account
Definition
T
Term
What are 4 ways to control access to network resources
Definition
- MAC
- DAD
- RBAC (role)
- RBAC (rule)
Term
What does MAC stand for?
Definition
Mandatory Access Control
Term
What does DAC stand for?
Definition
Discretionary Access Control
Term
What do the 2 types of RBAC stand for?
Definition
Rule and Role Based Access Control
Term
What is MAC?
Definition
An access control solely managed by an administrator.
Term
What is DAC?
Definition
Users can dynamically share resources with others.
Term
Which access control is used by Unix via Owner, Group, Other?
Definition
DAC
Term
Which access control is considered most secure?
Definition
MAC
Term
Which access control is considered inflexible?
Definition
MAC
Term
Which version of RBAC uses preconfigured security policies?
Definition
Rule Based Access Control.
Term
Which RBAC uses an ACL?
Definition
Rule Based Access Control
Term
(T/F) Rule and Role BAC are often used together.
Definition
T
Term
Give 5 examples of authentication protocols
Definition
- PAP
- CHAP
- SPAP
- TOTP
- HOTP
Term
What does PAP stand for?
Definition
Password Authentication Protocol
Term
What does SPAP stand for?
Definition
Shiva Password Authentication Protocol
Term
What does CHAP stand for?
Definition
Challenge Handshake Authentication Protocol
Term
What does TOTP stand for?
Definition
Time-based One Time Protocol
Term
What does HOTP stand for?
Definition
HMAC-based One Time Protocol
Term
What is PAP?
Definition
- not used because it sends username/password in the clear
Term
What is SPAP?
Definition
Same as PAP, but encrypts the username/password. But uses the same reversibly encrypted form. So its susceptible to replay attack. Record the password, then resend the password to login.
Term
What is the replay attack?
Definition
Attacker captures packets and replays them to gain access to the network.
Term
What is CHAP?
Definition
An authentication protocol where it periodically verifies the identity of the client by using a 3-way handshake verification process. (More like a 3-step handshake - SYN, ACK, ACK-ACK, also known as TCP handshake)
Term
What does HMAC stand for?
Definition
Hash-based Message Authentication Code
Term
(T/F) TOTP uses a secret key
Definition
T
Term
(T/F) HOTP uses a secret key
Definition
T
Term
(T/F) HOTP uses time
Definition
F
Term
(T/F) TOTP uses a hash function
Definition
F
Term
What are the 7 authentication services?
Definition
- RADIUS
- TACACS+
- XTACACS
- LDAP
- Secure LDAP
- SAML
- Kerberos
Term
What does RADIUS stand for?
Definition
Remote Authentication Dial-In User Service
Term
What is RADIUS?
Definition
An authentication service where a server authenticates the user via username/password. It is a single-point of entry for a private network
Term
Which authentication service provides centralized management for all remote connections?
Definition
RADIUS server
Term
(T/F) RADIUS server is not used anymore because it was originally used for dial-up service.
Definition
F, still used today
Term
What does TACACS+ stand for?
Definition
Terminal Access Controller Access-Control System
Term
What does XTACACS stand for?
Definition
Extended Terminal Access Controller Access-Control System
Term
Which authentication service allows credentials to be accepted from multiple methods?
Definition
TACACS+ and XTACACS
Term
(T/F) TACACS+ accepts credentials from Kerberos
Definition
T
Term
What authentication service replaced TACACS?
Definition
XTACACS
Term
What additional services is provided by XTACACS over TACACS?
Definition
Combines authentication with authorization and added logging for auditing.
Term
What does LDAP stand for?
Definition
Light-weight Directory Access Protocol
Term
What is LDAP?
Definition
An authentication service where a standardized protocol is used to store information on users, systems, networks, etc.
Term
What does LDAPS stand for?
Definition
Secure LDAP
Term
What is LDAPS?
Definition
LDAP where communication is encrypted using SSL/TLS
Term
What port does LDAP use?
Definition
389
Term
What port does LDAPS use?
Definition
636
Term
What is the most popular authentication service used today?
Definition
LDAP
Term
What does SAML stand for?
Definition
Security Assertion Markup Language
Term
What is SAML?
Definition
An XML based open-standard data format for exchanging authentication and authorization data
Term
Which authentication service is used for single-sign on capability from a browser?
Definition
SAML
Term
Which authentication service is used for single sign-on for networks?
Definition
Kerberos
Term
What is Kerberos?
Definition
An authentication service where a user is given a token. This token is provided to a server (KDC). The KDC authenticates and provides a service token.
Term
What does KDC stand for?
Definition
Key Distribution Center
Term
What does TGT stand for?
Definition
Ticket Granting Ticket
Term
What is the lifespan of a TGT
Definition
About 10 hours
Term
What is the lifespan of a service ticket?
Definition
About 5 minutes
Term
What is one of the most popular authentication services?
Definition
Kerberos
Term
What is "Least privilege"?
Definition
Granting users with the least amount of privileges to do their job
Term
What does "separation of duties" mean?
Definition
Providing levels of permissions and privileges, such as:
- System Administrator
- local administrator
- regular users
- restricted users
Term
What is "time of day restrictions"?
Definition
Restricting users to login within a timeframe, such as 9-to-5.
Term
What is 802.11x?
Definition
Refers to the IEEE 802.11 standard for defining communication over wireless LAN.
Term
(T/F) 802.11x allows authentication at the central authority instead of the WAP
Definition
T
Term
What is a Trusted OS?
Definition
An operating system that meets government requirements for security.
Term
What is CC?
Definition
Common Criteria is a document listing the common set of security standards for a Trusted OS.
Term
The CC is a joint effort between which countries?
Definition
US, UK, Germany, France, Netherlands, and Canada
Term
What are EALs?
Definition
Evaluation Assurance Levels. 7 evaluation criteria in the CC
Term
What is EAL1?
Definition
System operates correctly, security threats not considered serious
Term
What is EAL2?
Definition
- Good design practices from product developers
- Security not a priority
Term
What is EAL3?
Definition
Conscientious development to establish moderate levels of security
Term
What is EAL4?
Definition
- Requires security engineering based on good commercial development practices
- Common benchmark for commercial systems
Term
Most operating systems, such as, Apple OS, Windows, and Linux OS are certified at what EAL?
Definition
EAL4+ (EAL4 with some aspects of EAL5)
Term
What is EAL5?
Definition
- Security engineering has been implemented from early design of the OS
- Requires special design considerations
Term
What is EAL6?
Definition
- High level of specialized security engineering
- Provides strong protection from penetration attackers
Term
What is EAL7?
Definition
- Intended for extremely high levels of security
- Requires extensive measuring and independent testing of every component
Term
What are the 4 layers of TCP/IP?
Definition
1. Application
2. Transport
3. Internet
4. Network access
Term
What TCP/IP layer are HTTP and SMTP located?
Definition
Application
Term
What TCP/IP layer are TCP and UDP located?
Definition
Transport
Term
What TCP/IP layer are IP, ARP, and ICMP located?
Definition
Internet
Term
What TCP/IP layer deals with hardware?
Definition
Network access
Term
Which TCP/IP layer is also known as the host-to-host layer?
Definition
Transport
Term
What protocol name is "connectionless"?
Definition
UDP - User Datagram Protocol
Term
What does ICMP stand for?
Definition
Internet Control Message Protocol
Term
What does ARP stand for?
Definition
Address Resolution Protocol
Term
How many ports does TCP/IP provide?
Definition
65,535
Term
What port does HTTP use?
Definition
80
Term
What port is used by FTP?
Definition
20 and 21
Term
What port is used by Telnet?
Definition
23
Term
What port is used by SMTP?
Definition
25
Term
What port is used by TACACS?
Definition
49
Term
What port is used by HTTPS?
Definition
443
Term
What port is used by POP3?
Definition
110
Term
What port is used by IMAP?
Definition
143
Term
What are Well-Known ports?
Definition
- 0-1024
- reserved for specific protocols and services
- do not use these except for well-known services, such as port 143 for IMAP only
Term
What are Registered ports?
Definition
- 1024-49151
- reserved for specific services
Term
What are Dynamic or Private ports?
Definition
- 49152-65535
- Used for custom or temporary purposes
Term
What is a Firewall?
Definition
device that isolates one network from another
Term
What are the 3 main firewall functions?
Definition
- packet filter
- proxy firewall
- stateful packet inspection
Term
What is a Packet filter firewall?
Definition
- allows/denies based on port
- can just drop the packet or send rejection notification packet
Term
What is a Proxy firewall?
Definition
- intermediary between 2 networks
- receives request, if allowed, re-packages and forwards
- hides internal IP
Term
(T/F) Proxy firewall hides the internal IP address
Definition
T
Term
(T/F) Proxy firewalls are more costly and complex than other solutions
Definition
T
Term
(T/F) Proxy firewalls usually use just 1 NIC
Definition
F, proxy firewalls usually use 2 NICs (Network Interface Cards)
Term
What is a dual-homed network?
Definition
- proxy firewall
- 2 NICs
- 1 NIC for private network
- 1 NIC for public network
Term
(T/F) Proxy firewalls often provide caching where data is returned from memory and the request never leaves the server
Definition
T
Term
(T/F) Packet filter firewall is considered stateless
Definition
T
Term
(T/F) Proxy firewall is considered stateless
Definition
T
Term
What does SPI stand for?
Definition
Stateful Packet Inspection
Term
What is a SPI firewall?
Definition
- remembers aspects of the traffic
- makes decision based on previous occurrences
- may require complex configuration
- if unsolicited packet comes from unknown IP, firewall rejects it. But if the request came from internal/private network for the same unknown IP, then the subsequent response will be allowed to enter
Term
What is SPI filtering?
Definition
Another name for SPI firewall
Term
What is a Router?
Definition
device that connects 2 or more networks
Term
What is the difference between a Switch and a Router
Definition
Router connects networks. Switch creates networks.
Term
What is a proxy server?
Definition
server that acts as an intermediary for requests from clients seeking resources from other servers
Term
How is a proxy server commonly implemented?
Definition
As a service on a server
Term
What are some other services that a proxy server provides?
Definition
- caching commonly accessed resources
- filtering incoming/outgoing requests
- load balancing
Term
What is an IDS?
Definition
Intrusion Detection System - software that monitors network traffic activity
Term
What are the 4 types of IDS's?
Definition
- Behavior-based IDS
- Signature-based IDS
- Anomaly-based IDS
- Heuristic IDS
Term
What type of IDS will detect unusual high traffic?
Definition
Behavior-based IDS
Term
What type of IDS will detect policy violations?
Definition
Behavior-based IDS
Term
What does MD-IDS stand for?
Definition
Misuse Intrusion Detection System
Term
What type of IDS is used to look at attach signatures and audit trails?
Definition
Signature-based IDS
Term
What is an Anomaly-based IDS?
Definition
An IDS that looks for out of the ordinary things, deviated from a baseline.
Term
What is a Heuristic IDS?
Definition
An IDS that uses an algorithm to analyze traffic
Term
What does IPS stand for?
Definition
Intrusion Protection System
Term
(T/F) An IPS takes IDS to the next level
Definition
T
Term
What does an IPS do?
Definition
Performs IDS functionality, then takes action to block the offending traffic
Term
(T/F) An IDS can drop packets to prevent traffic
Definition
F, an IPS does this.
Term
What does UTM stand for?
Definition
Unified Threat Management
Term
What is a UTM?
Definition
A device that provides a firewall, plus:
- network intrusion prevention
- gateway anti-virus scans
- gateway anti-spam functionality
- VPN
- content filtering
- load balancing
- reporting
Term
What are some advantages of a UTM?
Definition
- reduced complexity of using a single box/single vendor
- simplicity of single software install and maintenance
- simplified management of plug-n-play
- web-based GUI management
- lower training required
- meets most security requirements
Term
What are some disadvantages of a UTM?
Definition
- single point of failure
- single point of compromise
- traffic may exceed UTM's capability
Term
(T/F) Advantages of UTM outweigh the disadvantages
Definition
T
Term
What is a protocol analyzer?
Definition
- usually software
- used to capture and analyze traffic on a network
Term
What is a "sniffer"?
Definition
protocol analyzer
Term
(T/F) Protocol analyzers can be used by hackers to collect intrusion information
Definition
T
Term
What is the best defense against a sniffer?
Definition
Encryption
Term
(T/F) You will still be able to see from/to IP addresses of encrypted data.
Definition
T
Term
What's another name for "layered security"?
Definition
defense in depth
Term
What are some of the network security levels?
Definition
- Physical Security
- Data Security
- Network Design/Structure Security
Term
What are some examples of Physical Security?
Definition
guards, protected passwords, 2-factor authentication, card readers
Term
What are some examples of Data Security?
Definition
- Authorization/Authentication
- Encryption
- Tunneling
Term
What are some examples of Network Design/Structure Security?
Definition
- DMZ
- VLANs
- NAT
Term
What does DMZ stand for?
Definition
Demilitarized Zone
Term
What's another name for DMZ?
Definition
Perimeter Network
Term
(T/F) A DMZ is a separate network
Definition
T
Term
(T/F) A DMZ is on the private network
Definition
F, it is neither totally on the private or the public network.
Term
(T/F) A DMZ protects against internal threats
Definition
F
Term
(T/F) Routers of a VLAN will not pass broadcasts to other network segments
Definition
T
Term
(T/F) Hosts can be in a VLAN segment regardless of physical location on the network.
Definition
T
Term
What is a VLAN?
Definition
Virtual Local Area Network, where hosts can be logically/virtually separated into groups on a network via software within a router.
Term
(T/F) VLANs offer a layer of security
Definition
T
Term
(T/F) NAT is a function of a firewall
Definition
T
Term
Show an example of NAT.
Definition
Client request -> src=192.168.1.154/dest=72.6.8.10 -> Firewall -> src=123.123.1.2/dest=72.6.8.10 -> Destination

Destination sends response -> src=72.6.8.10/dest=123.123.1.2 -> Firewall -> src=72.6.8.10/dest=192.168.1.154
Term
List some examples of malware types.
Definition
- spyware
- adware
- rootkits
- trojan horses
- logic bombs
- backdoors
- botnets
- ransomeware
Term
What is the difference between spyware and adware?
Definition
They both can be just benign and just install marketing information, but spyware can install information collection to capture your passwords.
Term
What is a logic bomb?
Definition
malware that executes when a predefined event occurs.
Term
What is a "zombie" computer?
Definition
When a malware is installed onto a computer and receives instructions from some other computer.
Term
What is a "bot herder"?
Definition
A computer that controls "zombie" computers.
Term
What is ransomware?
Definition
A form of spyware that takes control of a system and demands payment before the system can be unlocked.
Term
What are the 8 common viruses?
Definition
- Armored
- Companion
- Macro
- Multipartite
- Phage
- Polymorphic
- Retro
- Stealth
Term
What is an Armored virus?
Definition
- Made to be difficult to detect
- Made to prevent examination of code
- May include decoys to make analysis difficult
Term
What is an Companion virus?
Definition
- Attaches itself to a legitimate program and when launched, creates a new program with a different extension.
- May make Registry changes
Term
What is an Macro virus?
Definition
- Exploits enhancement programmability to certain applications (i.e.. macros in MS Word and Excel)
- Fastest growing exploitation
Term
What is an Multipartite virus?
Definition
- attacks in multiple ways, such as, boot sector, executables, applications, ...
- continues to do damage, while you deal with one aspect of the virus
Term
What is an Phage virus?
Definition
- Modifies other programs
- Can affect databases
Term
What is an Polymorphic virus?
Definition
- Can change form to avoid detection
- May encrypt itself to avoid detection
Term
What's the term used when a virus can change itself or encrypt itself?
Definition
Mutation
Term
What is an Retro virus?
Definition
- Attacks or bypasses the anti-virus software installed on your computer.
- Attempts to destroy the anti-virus definitions
Term
What is an Stealth virus?
Definition
- Masks itself to avoid detection
- May attach itself to the boot sector
- May move itself from file to file during virus scan to avoid detection
Term
What is the number one cause of failure for anti-virus software to detect an infection?
Definition
out of date signatures
Term
What are the 10 types of attacks?
Definition
- DOS
- Spoofing
- Pharming
- Phishing
- Xmas
- Man-in-the-middle
- Replay
- Smurf
- Privilege Escalation
- Password
Term
What is a DOS attack?
Definition
Makes resources so busy that authorized users cannot make requests.
Term
What is a Spoofing attack?
Definition
- Capturing and modifying data on its way to a destination
Term
What's another name for Spoofing?
Definition
Masquerading
Term
What is a Pharming attack?
Definition
Traffic intended to one host is redirected to another host
Term
What is a Phishing attack?
Definition
- Requesting information by making a request look legitimate
- A form of social engineering.
Term
What is Spear Phishing?
Definition
- Phishing directed to a group or person
- Messages that appear from a trusted source.
Term
What is Vishing?
Definition
VOIP version of Phishing.
Term
What is a Xmas attack?
Definition
- attack using nmap (network mapping utility)
- firewall/open port attack
Term
What is "Man-in-the-middle" attack?
Definition
- rogue router or software placed between a server and a host
- forwards data to attacker
Term
What is a Replay attack?
Definition
- data is captured and replayed later.
- for example, capture a user's username/password, then later that evening, replay it to login.
Term
What is a Smurf attack?
Definition
- spoof target computer's IP and begin issuing broadcast using that IP
- network becomes overloaded
Term
What is a Privilege Escalation attack?
Definition
- attacker gains more privilege than they should have
Term
(T/F) Privilege Escalation attack is usually associated with a backdoor
Definition
T
Term
What is a Password attack?
Definition
when an account is attacked repeatedly in order to crack the password
Term
What are 5 variations of the Password attack?
Definition
- Brute-Force attack
- Dictionary attack
- Hybrid attack
- Birthday attack
- Rainbow attack
Term
What is a Brute-Force attack?
Definition
- type of Password attack
- attacker guesses passwords until successful
Term
What is a Dictionary attack?
Definition
- type of Password attack
- similar to Brute-Force attack
- attacker uses dictionary words to guess password until successful
Term
What is a Hybrid attack?
Definition
- type of Password attack
- combination of Brute-Force and Dictionary attack
Term
What is a Birthday attack?
Definition
- type of Password attack
- attempt to create the same hash used in the authentication process
- statistically speaking, the more people you have in the room, the likelihood of people with the same hash gets higher
Term
What is a Rainbow attack?
Definition
- type of Password attack
- Compares values in an existing table of hashed phrases or words to a password hash
Term
What is the most dangerous and difficult security risk to identify and control?
Definition
Malicious insiders
Term
What is a Client-side attack?
Definition
attacks on a client machine, usually malware
Term
What is "Typo Squatting"?
Definition
Registering domain names that are common misspellings of valid URLs
Term
What is "URL Hijacking"?
Definition
Same as "Typo Squatting"
Term
What is a "Watering Hole" attack?
Definition
Poisoning a site that is frequently visited, such as, hosted email sites
Term
What is a "Transitive Access" attack?
Definition
Takes advantage of transitive access (A trusts B and B trusts C, therefor A trusts C). Attacks on C now has access to A & B, not just B.
Term
(T/F) Transitive access can be granted to domains
Definition
T
Term
What are the 9 examples of application attacks?
Definition
- XSS
- SQL Injection
- LDAP Injection
- XML Injection
- Directory Traversal/Command Injection
- Buffer Overflow
- Integer Overflow
- Zero-day Exploits
- Cookies and Attachments
Term
What does XSS stand for?
Definition
Cross-site Scripting
Term
What is XSS?
Definition
- attacker injects client side code into a web page
Term
What is SQL Injection?
Definition
- SQL is injected into data that is entered on a webpage
- data is sent to database and run as SQL, not entered as data.
Term
What is "LDAP Injection"?
Definition
Similar to SQL Injection, but using LDAP code injection
Term
What is "XML Injection"?
Definition
Similar to SQL Injection, but using XML path queries.
Term
What is Directory Traversal/Command Injection attack?
Definition
- Attacker gains access to restricted directories, such as the root directory
- Injecting OS commands into requested data.
Term
What is a Buffer Overflow attack?
Definition
Sending more data than a program is capable of accepting
Term
(T/F) When an application errors due to Buffer Overflow attack, the error message can contain private information
Definition
T
Term
What is an Integer Overflow attack?
Definition
Similar to Buffer Overflow, but sending an integer that's too large.
Term
What is a Zero-day Attack?
Definition
Attack on a security hole before a patch is released.
Term
(T/F) Zero-day attack occurs often with web browsers
Definition
T
Term
What is a Cookies/Attachments attack?
Definition
Additional information saved to be retrieved later. This data can be exploited later.
Term
List 4 wireless networking standards
Definition
- 802.11a
- 802.11b
- 802.11g
- 802.11n
Term
What are 802.11a specs?
Definition
- Frequency: 5 GHz
- Speed: up to 54 Mbps
- Max range: 150 feet
- Required WAP and NIC be 802.11a compliant
Term
(T/F) 802.11a was widely accepted
Definition
F, not widely accepted due to the range limitation of 150 ft
Term
(T/F) 802.11a was the first standard for wireless networking
Definition
F, 802.11b was the first
Term
What are the 802.11b specs?
Definition
- Frequency: 2.4 GHz
- Speed: 11 Mbps
- Max range: 300 feet
Term
What are the 802.11g specs?
Definition
- Frequency: 2.4 GHz
- Speed: 54 Mbps
- Max range: 300 feet
Term
(T/F) 802.11g is backward compatible with 802.11a
Definition
F, it's compatible with 802.11b
Term
What does MIMO stand for?
Definition
Multiple In, Multiple Out
Term
What are 802.11n specs?
Definition
- Frequency: 2.4 and 5 GHz
- Speed: Theoretical 600 Mbps, Normal 100 Mbps
- Max range: 300 feet
- Supports MIMO with multiple antennas
Term
(T/F) 802.11n is backward compatible with 802.11g, 802.11b, and sometimes 802.11a
Definition
T
Term
List 3 wireless encryption types.
Definition
- WEP
- WPA
- WPA2
Term
What does WAP stand for?
Definition
- Wireless Access Point
- Wireless Application Protocol
Term
What does WEP stand for?
Definition
Wired Equivalency Privacy
Term
(T/F) WEP is highly used today
Definition
F, extremely vulnerable to attack
Term
What are some WEP specs?
Definition
- 40 bit encryption
- some vendors provided 104 bit encryption
Term
What does WPA stand for?
Definition
Wifi Protected Access
Term
(T/F) WPA is widely used today
Definition
F, not secure option.
Term
List some WPA specs.
Definition
- Addressed security of WEP
- Has weaknesses
- Added user authentication
- Uses TKIP
- Based on 802.1x and EAP
- Depends on authentication server, like RADIUS
Term
What does TKIP stand for?
Definition
Temporal Key Integrity Protocol
Term
What does EAP stand for?
Definition
Extensible Authentication Protocol
Term
What is WPA2?
Definition
- Wifi Protected Access 2
- Uses AES
Term
(T/F) WPA is currently the most secure wireless networking protocol
Definition
F, WPA2 is
Term
What is Wireless Application Protocol?
Definition
- wireless data transmission standard designed to provide wireless networking for wireless devices
- TCP/IP for wireless devices
- Uses WML
- Uses WMLScript
Term
What is WML?
Definition
- Wireless Markup Language
- HTML for wireless devices
Term
What is WMLScript?
Definition
- Scripting language for wireless devices
Term
What is EAP?
Definition
- Protocol for wireless networks
- Expands on PPP authentication
- Used to connect computer to Internet
Term
What does PPP stand for?
Definition
Point-to-Point Protocol
Term
List some types of EAP.
Definition
- EAP-TLS
- EAP-PSK
- EAP-MD5
- LEAP
- PEAP
Term
What does LEAP stand for?
Definition
Lightweight EAP
Term
(T/F) LEAP is preferred over PEAP
Definition
F, PEAP replaced LEAP
Term
What does PEAP stand for?
Definition
Protected EAP
Term
What is PEAP?
Definition
An authentication protocol that establishes an encrypted channel between the server and client
Term
What is considered the strongest version of EAP?
Definition
PEAP
Term
What are the 5 main wireless attack types?
Definition
- Rogue access point
- Jamming
- Interference
- Evil twin
- Replay attack
Term
What is a Rogue Access Point attack?
Definition
- unauthorized Wireless Access Point
- used for man-in-the-middle attack
Term
What's the difference between Jamming and Interference?
Definition
Interference is unintentional
Term
What is an Evil Twin?
Definition
A rogue access point used for phishing attacks
Term
What is Application Hardening?
Definition
Ensuring Applications are updated and configured correctly for secure operation.
Term
What are the 3 database tier models?
Definition
- One tier: db and apps on one server
- Two tier: apps on client machine, and db on a server
- Three tier: client, server, db machines
Term
What are the 3 types operating system patches?
Definition
- Service Pack
- Patch
- Hotfix
Term
What is a Service Pack?
Definition
- Cumulative updates designed to correct known issues
- Should be tested before applied.
- Should be applied as soon as possible
Term
What is a Patch?
Definition
- Provides additional functionality or non-urgent fix
- Often optional
Term
What is a Hotfix?
Definition
- urgent fix for security flaw
- not optional
- apply ASAP
Term
(T/F) Application level updates are kept more up to date than OS level updates
Definition
F
Term
What does OWASP stand for?
Definition
Open Web Application Security Project
Term
What does CERT stand for?
Definition
Computer Emergency Response Team
Term
(T/F) The entire network is only as strong as its weakest host
Definition
T
Term
What are the 2 ways to establish and maintain security?
Definition
- keep hosts updated with malware protection
- keep hosts at an established security baseline
Term
What does ACL stand for?
Definition
Access Control List
Term
What are 5 file permission levels?
Definition
- Full Control
- Modify
- Read and Execute
- Read
- Write
Term
What does Full Control on a file mean?
Definition
- Read, Write, Execute, Modify, and assign permissions to other users
Term
What is the one additional permission assigned to folders?
Definition
list
Term
What's another name for security baseline?
Definition
Performance baseline, and sometimes, software baseline
Term
What is a Security Baseline Analyzer?
Definition
a software tool that scans computers and creates security report
Term
(T/F) Users should have minimum required permissions
Definition
T (note the word "required")
Term
What does DHCP stand for?
Definition
Dynamic Host Control Protocol
Term
(T/F) DHCP is an authenticated protocol
Definition
F
Term
What does DNS stand for?
Definition
Domain Name Server
Term
What are 3 main attacks on a DNS?
Definition
- DOS
- Network Footprinting
- DNS Poisoning
Term
What is DNS Poisoning?
Definition
- Compromising record integrity
- changing DNS names to point to wrong IPs
Term
What does DOS stand for?
Definition
Denial of Service
Term
What is DNSSEC?
Definition
Domain Name System Security Extensions. It is additional protocol added to DNS to add security. It adds authentication, data integrity, and authenticated denial of existence
Term
Who created DNSSEC?
Definition
IETF
Term
What does IETF stand for?
Definition
Internet Engineering Task Force
Term
How do you harden DNS?
Definition
Implement DNSSEC
Term
What does it mean to "Authorize" a DHCP server
Definition
To enable DHCP on that server. Also known as "Activating" a DHCP server.
Term
How can fault tolerance be implemented?
Definition
- Data backups
- Data management (e.g.. RAID)
- Clustering
- Load Balancing
Term
What is the most important part of a PC?
Definition
data
Term
What does RAID stand for?
Definition
Redundant Array of Independent Disks
Term
(T/F) RAID is always hardware based
Definition
F, it can be hardware or software based
Term
What is RAID 0?
Definition
- offers striping
- not fault tolerant
Term
Is RAID 0 fault tolerant
Definition
No
Term
What is striping?
Definition
When data is broken up into separate blocks and written to multiple disks at the same time. Makes for fast writing. Also known as disk striping
Term
What is RAID 1?
Definition
- offers disk mirroring
- is fault tolerant
Term
What's it the disadvantage of RAID 1?
Definition
Unable to use full purchased disk space because half is used for fault tolerance.
Term
Is RAID 1 fault tolerant?
Definition
yes
Term
What is RAID 5?
Definition
- offers striping with parity
- 3 or more disks
Term
How many disks, at a minimum, are in RAID 5?
Definition
3
Term
What are the different clustering modes?
Definition
- Active clustering
- Passive clustering
Term
What is Active clustering?
Definition
- All nodes in the cluster are providing services
- If one node fails, the other node provides all services
- Performance may be reduced until failed node is back online
Term
What is Passive clustering
Definition
- Only one node provides services
- Other node provides services if active node fails
Term
(T/F) clustering can be expensive due to knowledge and attention
Definition
T
Term
What are the 3 types of backup?
Definition
- Full backup
- Differential backup
- Incremental backup
Term
What is an archive bit?
Definition
Every file has an archive bit set to 0 or 1.
0 means the data has been backed up and has not been modified since the last backup. 1 means it has been modified since the last backup
Term
Which type of backup takes the longest?
Definition
Full
Term
Which type of backup is easiest to use for data recovery?
Definition
Full
Term
What is Full backup?
Definition
All files are backed up and archive bits set to 0
Term
What is a Differential backup?
Definition
Makes a copy of all files that have been modified since the last full backup. Looks for the archive bit set to 1.
Term
(T/F) Differential backup requires a full backup.
Definition
T
Term
(T/F) Differential backup sets the archive bit back to 0
Definition
F
Term
(T/F) Full backup sets the archive bit back to 0
Definition
T
Term
(T/F) If a full backup was done on Sunday, and a daily differential backup is performed, and a failure occurs on Thursday morning, restoring the full backup and Wednesday's differential will recover all data.
Definition
T
Term
(T/F) As more and more modifications occur, each differential backup gets bigger and takes longer.
Definition
T
Term
(T/F) An Incremental backup does not need a full backup.
Definition
F, a full backup needs to be performed to create the baseline for incremental backups.
Term
What is an Incremental backup?
Definition
Makes a copy of all files that have been modified since the last full backup. Looks for the archive bit set to 1.
Term
(T/F) An Incremental backup sets the archive bit back to 0
Definition
T
Term
(T/F) If a full backup was done on Sunday, and a daily incremental backup is performed, and a failure occurs on Thursday morning, restoring the full backup and Wednesday's incremental will recover all data.
Definition
F, need to restore full, then each incremental backup since the full backup
Term
Which backup type is the fastest?
Definition
Incremental
Term
Which backup type is the slowest and most complex recovery type?
Definition
Incremental
Term
What are the 4 types of clouds?
Definition
- Private
- Public
- Community
- Hybrid
Term
Which organization defined the cloud types?
Definition
NIST
Term
(T/F) A private cloud can be on or off premise
Definition
T
Term
(T/F) A private cloud does not need to be internet based
Definition
T, it could consist of an organization's internal networks.
Term
What is a Private cloud?
Definition
A cloud infrastructure dedicated to the organization and not shared with others.
Term
(T/F) Private clouds are more vulnerable to security issues than Public clouds
Definition
F
Term
What is a Public cloud?
Definition
Cloud infrastructure made available to the general public.
Term
What is a Community cloud?
Definition
Multiple organizations sharing a cloud infrastructure due to common needs.
Term
What is a Hybrid cloud?
Definition
Composition of 2 or more cloud types (private, public, community)
Term
Which cloud type requires the most administrative overhead and security?
Definition
Hybrid
Term
What are the 3 cloud based service models defined by NIST?
Definition
- SaaS
- PaaS
- IaaS
Term
(T/F) Google is a SaaS
Definition
T
Term
What is SaaS?
Definition
Software as a Service where software is runnable via a cloud service.
Term
What is PaaS?
Definition
Platform as a Service where applications are deployed onto a cloud infrastructure.
Term
(T/F) PaaS allows cloud infrastructure to be managed
Definition
F
Term
(T/F) PaaS allows for applications to be managed
Definition
T
Term
(T/F) SaaS allows for applications to be managed.
Definition
F
Term
What is IaaS?
Definition
Infrastructure as a Service where cloud services, such as, processing, storage, and networks are provisioned.
Term
(T/F) IaaS allows operating systems and arbitrary applications to be managed by the cloud
Definition
T
Term
(T/F) In IaaS, the customer manages the cloud infrastructure
Definition
F, customer does not manage any cloud infrastructure. In IaaS, the cloud provisions services. The infrastructure is still managed by the cloud provider.
Term
What are the 2 main security concerns with cloud computing?
Definition
- multi-tenancy
- laws and regulations
Term
Explain multi-tenancy concerns.
Definition
- different clients' data co-exist on the same machine
- data separation controlled by configuration of cloud infrastructure
- so your data could be at risk by other clients or by cloud provider
- you must also protect your data from other cloud consumers
Term
Explain laws and regulation concerns pertaining to the cloud.
Definition
- cloud consumer retains the responsibility for legal compliance
- cloud removes a lot of control over your data
Term
(T/F) Cloud consumer retains the responsibility for legal compliance
Definition
T
Term
(T/F) Cloud provider retains the responsibility for legal compliance
Definition
F
Term
(T/F) Data placed in the cloud should be backed up locally
Definition
T
Term
What is Social Engineering?
Definition
Exploiting the trusting nature of people to gain information or access
Term
(T/F) Social engineering can be done over email.
Definition
T
Term
What are the 7 common social engineering attack types.
Definition
- shoulder surfing
- dumpster diving
- tailgating
- impersonation
- hoaxes
- whaling
- vishing
Term
(T/F) Shoulder surfing includes reading information on desks.
Definition
T
Term
(T/F) Green initiatives can increase exposure of secure data.
Definition
T, like putting secure documents for recycling instead of burning.
Term
(T/F) Impersonation can be in person or via email.
Definition
T
Term
What's the difference between Vishing and phishing over the phone?
Definition
- VOIP has no caller ID, tracing, or other land-line related features. (may not be true, but this is what the exam says)
Term
What is the best defense against social engineering?
Definition
Education
Term
With respect to social engineering, what is "consensus" or "social proof"?
Definition
- playing on people's desire to be right
- overly polite or encouraging
Term
With respect to social engineering, what is "scarcity"?
Definition
Convincing someone to act quickly due to limited opportunity.
Term
With respect to social engineering, what is "urgency"?
Definition
- similar to scarcity but with respect to time.
Term
With respect to social engineering, what is "familiarity"?
Definition
- mental guards are lowered when you like someone.
- you like someone because they compliment you or do you favors.
- you like someone with common interests, common job aspects, etc
Term
With respect to social engineering, what is "trust"?
Definition
- Providing information, assistance, or service that implies reciprocation is proper.
- I do something for you, then you should do something for me.
Term
What protocol is used by FTP?
Definition
TCP
Term
What protocol is used by SSH?
Definition
TCP
Term
What protocol is used by SFTP?
Definition
TCP
Term
What protocol is used by SCP?
Definition
TCP
Term
What protocol is used by TFTP?
Definition
UDP
Term
What protocol is used by FTPS?
Definition
TCP
Term
What protocol is used by SMTP?
Definition
TCP
Term
What protocol is used by POP3?
Definition
TCP
Term
What protocol is used by IMAP4?
Definition
TCP
Term
What protocol is used by Telnet?
Definition
TCP
Term
What protocol is used by TACACS?
Definition
UDP
Term
What protocol is used by TACACS+?
Definition
TCP
Term
What protocol is used by SSL?
Definition
TCP
Term
What protocol is used by L2TP?
Definition
UDP
Term
What protocol is used by PPTP?
Definition
TCP and UDP
Term
What protocol is used by RDP?
Definition
TCP and UDP
Term
What protocol is used by DNS?
Definition
TCP and UDP
Term
What protocol is used by DHCP?
Definition
UDP
Term
What protocol is used by HTTP?
Definition
TCP
Term
What protocol is used by HTTPS?
Definition
TCP
Term
What protocol is used by Kerberos?
Definition
TCP and UDP
Term
What protocol is used by NNTP?
Definition
TCP
Term
What protocol is used by SNMP?
Definition
UDP
Term
What protocol is used by LDAP?
Definition
TCP and UDP
Term
What port is used by SSH?
Definition
22
Term
What port is used by SFTP?
Definition
22
Term
What port is used by SCP?
Definition
22
Term
What port is used by TFTP?
Definition
69
Term
What port is used by FTPS?
Definition
443
Term
What port is used by L2TP?
Definition
1701
Term
What port is used by PPTP?
Definition
1723
Term
What port is used by RDP?
Definition
3389
Term
What port is used by DNS?
Definition
53
Term
What port is used by DHCP?
Definition
67 and 68
Term
What port is used by DHCP?
Definition
67 and 68
Term
What port is used by Kerberos?
Definition
88
Term
What port is used by NNTP?
Definition
119
Term
What port is used by NNTP?
Definition
119
Term
What port is used by SNMP?
Definition
161
Term
What is a mantrap?
Definition
Physical security where a locked door allows a person to enter, but the exit door is also a locked door and will not unlock until entrance door is closed and the person is authorized
Term
What is cryptography?
Definition
Science of altering data to make it unreadable to anyone who does not possess the decryption method
Term
What is a cipher?
Definition
Method used to hide characters to hide their value
Term
What is ciphering?
Definition
Process of using a cipher
Term
What is steganography?
Definition
Process of hiding a message in a medium, such as digital image, audio, or other file
Term
What is symmetric cryptography?
Definition
Data is encrypted and decrypted based on the same secret key
Term
What type of cryptography is where both sender and receiver have the same key?
Definition
symmetric cryptography
Term
What types of ciphers are used by symmetric cryptography
Definition
block and stream
Term
What's the difference between block and stream ciphers
Definition
block works on data chunks. stream works on each bit.
Term
Which type of cryptography is faster to encrypt/decrypt?
Definition
symmetric cryptography
Term
(T/F) Symmetric cryptography is not as strong as asymmetric cryptography.
Definition
F, it's just as strong, but not as secure.
Term
(T/F) Symmetric cryptography is not as secure as asymmetric cryptography.
Definition
T
Term
What is asymmetric cryptography?
Definition
Uses 2 keys. One for encryption and the other for decryption. Keys are known as public and private keys. Sender and receiver have different keys.
Term
What are the 3 characteristics of a cryptographic hash?
Definition
- must be one way
- variable length input produces fixed length output
- algorithm must have few or no collisions
Term
What is a hashing algorithm collision?
Definition
2 different inputs create the same output
Term
What does PKI stand for?
Definition
Public Key Infrastructure
Term
What does PKC stand for?
Definition
Public Key Cryptography
Term
(T/F) PKI is part of PKC
Definition
T
Term
What is PKI?
Definition
set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
Term
What does RA stand for?
Definition
Registration Authority, not Recovery Agent
Term
What is an RA?
Definition
PKI role that assures valid and correct registration. Sometimes called a subordinate CA
Term
What does VA stand for?
Definition
Validation Authority
Term
What is a VA?
Definition
A third party that can provide entity (person/business providing PKI certificate) information on behalf of the CA
Term
(T/F) The private key is always used to encrypt and the public key is always used to decrypt
Definition
F, if public key encrypts and private key decrypts, then it is a key exchange operation. if private key encrypts and public key decrypts, its a digital signature operation
Term
What does PKI provide?
Definition
authentication and confidentiality
Term
What does CRL stand for?
Definition
Certificate Revocation List
Term
(T/F) The CRL can have suspended and expired certificates
Definition
T
Term
What is a Recovery Agent?
Definition
live person a couple people that recover lost keys.
Term
(T/F) Recovery Agent is mandatory
Definition
F, if key is lost, just need to add it to the CRL and a new key created.
Term
What is a Key Escrow?
Definition
- Agency or key archival system where copy or copies of your private key(s) are kept
- May have several databases containing parts of the private key
- Not available to Recover Agent.
- Available for law enforcement with warrant
Term
(T/F) Key Escrow is mandatory
Definition
F, optional but common
Term
(T/F) Digital certificates verify the owner of the private key
Definition
F, verifies owner of public key
Term
What does the RA do?
Definition
Verifies the key owner's identity and sends it to the CA to issue the certificate
Term
What is the set of standards for PKI?
Definition
X.509
Term
What is the current version for X.509 certificates?
Definition
3
Term
What is the current version for X.509 CRL?
Definition
2
Term
What's in a X.509 certificate?
Definition
- digital signature
- version
- serial number
- signature algorithm ID
- issuer name
- validity period
- subject name
- subject public key information
- issuer unique identifier
- subject unique identifier
Term
What does CSR stand for?
Definition
Certificate Signing Request
Term
(T/F) The RA can issue certificates to offload the workload from the CA
Definition
F, only the CA can issue certificates
Term
What does SSL stand for?
Definition
Secure Sockets Layer
Term
(T/F) SSL is TCP based
Definition
T
Term
(T/F) SSL uses asymmetric and symmetric encryption
Definition
T, asymmetric to establish connection, then symmetric for communication
Term
What does TLS stand for?
Definition
Transport Layer Security
Term
What is soft encryption?
Definition
software based encryption
Term
What is hard encryption?
Definition
hardware based encryption
Term
What does it mean to have a NIC in "promiscuous" mode?
Definition
NIC reads every packet even if its not addressed to that NIC
Term
What are the 2 Event logs in Windows?
Definition
Application and Security logs
Term
What are 6 main aspects of the OS to harden.
Definition
- Services
- Management Tools/Applications
- Software
- Patches
- User Access Control
- File system
Term
What is a honey-pot?
Definition
computer system designed to be attacked
Term
What are 2 forms of detection-style security?
Definition
- honey-pot
- tar-pit
Term
What is a tar-pit?
Definition
- often used interchangeably with honey-pot
- used to slow attack, not contain attack
Term
What are 2 legal considerations of using a honey-pot?
Definition
- Enticement
- Entrapment
Term
(T/F) Enticement is legal in the US
Definition
T
Term
(T/F) Entrapment is legal in the US
Definition
F
Term
What is a false positive?
Definition
An alert that is not a security issue
Term
What is a false negative?
Definition
No alert that should have been
Term
What are the 3 classifications of information?
Definition
- Public
- Private or Internal
- Restricted
Term
What is Limited Distribution?
Definition
Public information except for some of it.
Term
What does Full Distribution mean?
Definition
Public information made available to the general public
Term
What is Restricted Information?
Definition
Information that could seriously damage an organization if disclosed.
Term
What are the 3 concepts concerning information access?
Definition
- Confidentiality
- Integrity
- Availability
Term
What is the CIA triad?
Definition
- Confidentiality
- Integrity
- Availability
Term
What is HIPAA?
Definition
- Health Insurance Portability and Accountability Act
- Mandates standards and procedures for the storage, use, and transmission of personal medical information
Term
What is the Gramm-Leach-Bliley Act?
Definition
- Also known as the Financial Modernization Act of 1999
- Requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy
- Can't release info w/o customer permission
Term
What is the Computer Fraud and Abuse Act?
Definition
- Allows FBI to prosecute hackers, spammers, and others like terrorists.
- Protects government and financial institutions from intrusion
Term
What is the Family Educational Rights and Privacy Act?
Definition
- Prevents educational institutions from releasing information to unauthorized parties without the student's or student's parents permission (only if minor)
- institution must disclose student records to the student
Term
What is the Computer Security Act of 1987?
Definition
- Requires Federal agencies to identify and protect systems that store sensitive information
- Provide regular training for employees.
- Provide audits to protect data privacy
Term
What is the Cyberspace Electronic Security Act?
Definition
Gives law enforcement the right to gain access to encryption keys and cryptography methods
Term
What is the Cyber Security Enhancement Act?
Definition
Allows Federal agencies access to ISPs and other data transmission facilities to monitor communications of individuals suspected of committing computer crimes using the Internet.
Term
What is the Patriot Act?
Definition
- The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
- Gives the US Government extreme latitude in pursuing criminals who commit terrorist acts.
Term
What is an Interoperability Agreement
Definition
Agreements between multiple companies working together to determine things like data ownership and data management responsibilities
Term
What are the 4 documents that need to be in an Interoperability Agreement?
Definition
- SLA
- BPO
- MOU
- ISA
Term
What does SLA stand for?
Definition
Service Level Agreement
Term
What does BPO stand for?
Definition
Blanket Purchase Order
Term
What does MOU stand for?
Definition
Memorandum of Understanding
Term
What does ISA stand for?
Definition
Interconnection Security Agreement
Term
What is a SLA?
Definition
Defines the level of service provided
Term
What is a BPO?
Definition
- Usually applies to Government agencies
- Agreement for ongoing purchases and services between Government agencies and private companies
Term
What is a MOU?
Definition
A brief summary of the responsibilities of each company
Term
What is an ISA?
Definition
Documents the technical requirements of the connected systems
Term
What is meant by Storage Segmentation?
Definition
- Storing data in separate storage areas.
- Makes encryption faster and more efficient
Term
What is meant by Device Access Control?
Definition
Limiting the number of devices provided to employees.
Term
What does BCP stand for?
Definition
Business Continuity Plan
Term
(T/F) Disaster Recovery Plan is part of the BCP
Definition
T
Term
What does IRP stand for?
Definition
Incident Response Policies
Term
What are the 5 steps in an Incident Response?
Definition
- Identify
- Investigate
- Repair
- Document
- Procedural Adjustments
Term
What does RTO stand for?
Definition
Recovery Time Objectives
Term
What is RTO?
Definition
Maximum amount of time a resource can be down
Term
What does MTBF stand for?
Definition
Mean Time Between Failure
Term
What is MTBF?
Definition
Life expectancy of hardware
Term
What does MTTR stand for?
Definition
Mean Time to Restore or Repair
Term
What is MTTR?
Definition
How long it takes to repair
Term
What are the 3 things in an SLA?
Definition
- RTO
- MTBF
- MTTR
Term
What is Code Escrow?
Definition
It's an agreement between vendors as to responsibilities of source code
Term
What are 3 classifications of security testing?
Definition
- Black box
- White box
- Gray box
Term
What is Black Box Testing?
Definition
Tester has no knowledge of the system and functions like an outside attacker
Term
What is White box testing?
Definition
- Tester is familiar with the system
- Similar to rogue employee
Term
What is Gray box testing?
Definition
Tester has limited knowledge of the system
Term
What are 2 ways of security testing?
Definition
- Non-intrusive
- Intrusive
Term
What is Non-intrusive testing?
Definition
- passive testing
- non-disruptive
- weaknesses not exploited
Term
What is intrusive testing?
Definition
- identify and exploit weaknesses
- systems are penetrated
- not done during normal operations
Term
What is non-repudiation?
Definition
Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.
Supporting users have an ad free experience!