Term
|
Definition
| Session Initiation Protocol |
|
|
Term
|
Definition
| It is a signaling protocol used for controlling communication as in voice and video calls over IP-based networks. |
|
|
Term
|
Definition
| Social engineering activity over the telephone system. |
|
|
Term
|
Definition
| It is a standard that addresses call signaling and control multimedia transport and control, and bandwidth control for point to point and multipoint conferences. |
|
|
Term
|
Definition
| Real Time Transport Protocol |
|
|
Term
|
Definition
| It is used to transmit audio and video over IP-based networks. |
|
|
Term
|
Definition
| A program is used to automatically scan a list of telephone numbers to search for computers for the purpose of exploitation and hacking. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A secure private connection through an untrusted network. |
|
|
Term
|
Definition
| Point to Point Tunneling Protocol |
|
|
Term
|
Definition
| Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
| High Assurance Internet Protocol Encryptor |
|
|
Term
|
Definition
| It is a type I encryption device that is based on IPSec with additional restrictions, enchancements, and capabilities. |
|
|
Term
|
Definition
|
|
Term
| What is IPSec transport adjacency? |
|
Definition
| It is when a VPN uses more than one security protocol. |
|
|
Term
| What is iterated tunneling? |
|
Definition
| It occurs when an IPSec tunnel is tunneled through IPSec tunnel. |
|
|
Term
| Describe a SSL Portal VPN |
|
Definition
| An individual uses a single SSL connection to a web site to securely access multiple network services. |
|
|
Term
|
Definition
| Password Authentication Protocol |
|
|
Term
|
Definition
| It is used by remote users to authenticate over PPP conections. |
|
|
Term
| What is one of the most unsecure authentication method? |
|
Definition
|
|
Term
| How are PAP credentials sent? |
|
Definition
| They are sent cleartext (no encryption) |
|
|
Term
|
Definition
| Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
It addresses vulnerabilties found in PAP.
It uses a challenge/response mechanism to authenticate users.
|
|
|
Term
|
Definition
| Extensible Authentication Protocol |
|
|
Term
| How are signals measured? |
|
Definition
| They are measured by frequency and amplitudes. |
|
|
Term
|
Definition
| It has a tranfer rate of 11Mbps and is 2.4Ghz. |
|
|
Term
|
Definition
| It uses OFDM and works in the 5Ghz band. |
|
|
Term
|
Definition
| Provides QoS and supports multimedia traffic in wireless transmissions. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Frequency hopping spread spectrum |
|
|
Term
|
Definition
| It takes the total amount of bandwidth and splits it into smaller subchannels. |
|
|
Term
|
Definition
| Direct Sequence Spread Spectrum |
|
|
Term
|
Definition
| It applies sub-bits to a message and uses all of the available frequencies at the same time. |
|
|
Term
|
Definition
| Orthogonal Frequency-Division Multiplexing |
|
|
Term
|
Definition
| It is a digital multicarrier modulation scheme that compacts multiple modulated carriers thightly together reducing required bandwidth. |
|
|
Term
|
Definition
| It occus when one or more people walk or drive around with a wireless device equipped with software to identify AP's and break into them. |
|
|
Term
|
Definition
| It is the area covered by the satellite. |
|
|
Term
| What is the sender of information called? |
|
Definition
|
|
Term
| What are the two main microwave transmission technologies? |
|
Definition
|
|
Term
| What transmission is ground to orbiter to ground |
|
Definition
|
|
Term
| What transmission is ground to ground? |
|
Definition
|
|
Term
|
Definition
| It is unathorized access from a wireless device through a Bluetooth connection. |
|
|
Term
|
Definition
| Frequency Division Multiple Access |
|
|
Term
|
Definition
It was the earliest multiple access technology.
The available frequency is divided into sub-bands and one channel is assigned to each subscriber. |
|
|
Term
|
Definition
| Code Division Multiple Access |
|
|
Term
| Describe cell phone cloning |
|
Definition
| A regular cellphone is stolen and then reprogrammed with someone elses credentials. |
|
|
Term
|
Definition
|
|
Term
| How many layers are in the OSI model? |
|
Definition
|
|
Term
| What layer do routers work on? |
|
Definition
|
|
Term
|
Definition
| It is the session layer and it sets up, maintains, and breaks down the dialog between two applications. |
|
|
Term
|
Definition
| The data link layer prepares data for the network medium by framing it. |
|
|
Term
|
Definition
| It provides physical connections for transmission and performs the electrical encoding of data. |
|
|
Term
|
Definition
| it is a set of rules that dictates how computers communicate over networks. |
|
|
Term
| What are the two main protocols at the transport layer? |
|
Definition
|
|
Term
|
Definition
| It is a connection oriented protocol that sends and recieves acknowledgments. |
|
|
Term
|
Definition
| It is a connectionless protocol that does not recieve acknowledgements. |
|
|
Term
| Describe a proxy firewall |
|
Definition
| It is the middleman of communication. It does not allow anyone to connect directly to a protected host within the internal network. |
|
|
Term
| Describe an Application proxy firewall |
|
Definition
| It provides high security and has full application layer awareness. They can have poor performance, limited application support, and poor scalability. |
|
|
Term
| What packet switched WAN technologies use virtual circuits? |
|
Definition
|
|
Term
| How does TKIP provide more proection for WLAN environments? |
|
Definition
| It adds more keying material. |
|
|
Term
| Why are swithced infrastructures safer than routed networks? |
|
Definition
| It is more idfficult to sniff traffic since computers have virtual provate connections. |
|
|
Term
| What kind of proxy can not make access decisions based on protocol commands? |
|
Definition
|
|
Term
| What takes place at the data link layer? |
|
Definition
| End to end communication. |
|
|
Term
| What takes place at the session layer? |
|
Definition
|
|
Term
| What is the four step DHCP lease process? |
|
Definition
Discover
Offer
Request
Acknowledge |
|
|
Term
| What is used to shield networks from unauthenticated DHP clients? |
|
Definition
|
|
Term
|
Definition
| A method of storing and transmitting data in a form that only those it is intended for can read and process. |
|
|
Term
|
Definition
| The study of cryptanalysis and cryptography. |
|
|
Term
|
Definition
| It is the science of studying and breaking the secrecy of the encryption process. |
|
|
Term
|
Definition
| Transforming readable data into a form that appears to be random and unreadable. |
|
|
Term
|
Definition
| A system or product that provides encryption and decryption. |
|
|
Term
|
Definition
| It is a set of rules that dictates how enciphering and deciphering takes place. |
|
|
Term
| What comprises a cryptosystem? |
|
Definition
Software
Protocols
Alogrithms
Keys |
|
|
Term
| What services do cryptosystems provide? |
|
Definition
Confidentiality
Integrity
Authentication
Authorization
Nonrepudiation
|
|
|
Term
|
Definition
| It is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem. |
|
|
Term
|
Definition
| It is another name for algorithm. |
|
|
Term
|
Definition
| It is a sequence of bits used as instructions that govern the acts of cryptograhic functions within an algorithm. |
|
|
Term
|
Definition
| It is a range of possible values to construct keys. |
|
|
Term
|
Definition
| It is an ancient encryption tool that is used type of paper and rod used by Greek military factions. |
|
|
Term
| What is Kerckhoff's principal? |
|
Definition
| It is a concept that an algorithm should be known and only the keys should be kept secret. |
|
|
Term
| What is a number generator used for? |
|
Definition
| It is used to create a stream of random values and must be seeded by an initial value. |
|
|
Term
|
Definition
| It is a method of hiding data in another media type so the existenance of the data is concealed. |
|
|
Term
|
Definition
| it is an encryption method that is impossible to crack if carried out properly. |
|
|
Term
| What is a running key cipher? |
|
Definition
| It is a substituition cipher that creates keystream values, commonly from agreed-upon text passages to be used for encryption purposes. |
|
|
Term
|
Definition
| It is an encryption method that shifts values. |
|
|
Term
| What is a Key Derivation Functions |
|
Definition
| It is the generation of secret keys (subkeys) from an initial value.(master key) |
|
|
Term
| What are the strengths of symmetric algorithms? |
|
Definition
It is faster than asymmetric alogrithms.
It is hard to break if using a large key size. |
|
|
Term
| What are the weakness of symmetric algorithms? |
|
Definition
It requires a secure mechanism to deliver keys properly
Each pair of users needs a unique key making key management tedious.
It provides confidentiality but not authenticity or nonrepudiation. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Business Continuity Management |
|
|
Term
|
Definition
| It supplies the framework for and governance of designing and building the BCP effort. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It is a functional analysis in which a team collects data through interviews and documentary sources. |
|
|
Term
|
Definition
| Maximum Tolerable Downtime |
|
|
Term
|
Definition
| Maximum period time of disruption |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| It is the earliest time period and service level within which a business process must be restored after a disaster to aviod unacceptable consequences. |
|
|
Term
|
Definition
| It is the remainder of the overall MTD value. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It is the acceptable amount of data loss measured in time. |
|
|
Term
|
Definition
| It is a disruption in service due to a device malfunction or failure. |
|
|
Term
|
Definition
| It is an event thar causes the entire facility to be unusable for an entire day or more. |
|
|
Term
|
Definition
| It is a major disruption that destorys the facility altogether. |
|
|
Term
|
Definition
| Mean Time Between Failure |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It is the estimated lifetime of a piece of equipment. |
|
|
Term
|
Definition
| It is the estimate of how long it will take to fix a piece of equipment and get it back in production. |
|
|
Term
|
Definition
| It is a facility that is leased or rented and is fully configured and ready to operate within a few hours. |
|
|
Term
|
Definition
It is a leased facility that is partially configured with some equipment.
It is the most widely used model.
|
|
|
Term
|
Definition
It is a leased or rented facility that supplies the basic environment, but none of the equipment or additional services.
It may take weeks to get the site to get activated. |
|
|
Term
| What is a reciprocal agreement? |
|
Definition
| It is an agreement with another company to allow a company to establish an off site facility. |
|
|
Term
| Describe a rolling hot site |
|
Definition
| It is a mobile hot site where a large truck is turned into a working area. |
|
|
Term
| Describe remote journalism |
|
Definition
| It is another method of transmiitng data off-site. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It is a combination of technology and processes that work together to ensure some specific thing is always up and running. |
|
|
Term
|
Definition
| The standard for Business Continuity Management (BCM) |
|
|
Term
| What is a checklist test? |
|
Definition
| Copies of the plan are are handed out to each functional area for examiniation to ensure the plan properly deals with the areas needs and vulnerabilities. |
|
|
Term
| What is a structured walk-through test? |
|
Definition
| The representatives from each functional or department get together and walkthrough the plan from begining to end. |
|
|
Term
| What is a simulation test? |
|
Definition
| It is a a practice execution of the plan. |
|
|
Term
|
Definition
| It is where some system are run at the alternate site during the test. |
|
|
Term
| What is a full interuption test? |
|
Definition
| It is a test where regular operations are stopped and processing is moved to the alternate site. |
|
|
Term
| What is a computer assisted crime? |
|
Definition
| It is where a computer was used as a tool to carry out a crime. |
|
|
Term
| What is a computer targeted crime? |
|
Definition
| It is an incident where a computer was the victim of an attack to harm it and its owners. |
|
|
Term
|
Definition
| It is something that is proprietary to a company and important for its survival and profitability. |
|
|
Term
|
Definition
| Non Disclosure Agreement. |
|
|
Term
|
Definition
| It is used to protect a word associated with a company. |
|
|
Term
|
Definition
| Software that is publicly available free of charge. |
|
|
Term
|
Definition
It is used by vendors to market their software.
It is a free trial of software. |
|
|
Term
|
Definition
| Software Protection Agency |
|
|
Term
|
Definition
| Federation Against Software Theft |
|
|
Term
|
Definition
| Personally Identifiable Information |
|
|
Term
| What is the Sarbanes-Oxley Act (SOX) |
|
Definition
| It provides requirements for how companies must track, manage, and report financial information. |
|
|
Term
| When was the Computer Fraud and Abuse Act written? |
|
Definition
| 1986. It was amended in 1988, 1994, 1996, 2001, 2002, and 2008. |
|
|
Term
| What is the Computer Fraud and Abuse Act? |
|
Definition
It is the law in regards to:
Knowingly accessing a computer without authorization in order to obtain national security data.
Intentionally accessing a computer without authorization
Intending to defraud or obtain anything of value from an IS. |
|
|
Term
| What is minimum capital requirements? |
|
Definition
| Measures the risk and spells out the calculation for determining the minimum capital required. |
|
|
Term
|
Definition
| Federal Information Security Management Act of 2002 |
|
|
Term
|
Definition
It requires every federal agency to create an aagency wide security program to protect information systems.
Annual reviews must be conducted. |
|
|
Term
| What are the requirements of FISMA? |
|
Definition
Inventory of information systems
Category information and information systems according to risk level
Security controls
Risk assesment
Systsem security plan
Certification and accrediation
Continous monitoring |
|
|
Term
| What is the Economic Espionage Act of 1996? |
|
Definition
It provides the necesssary structure when dealing with espionage cases, and defines trade secrets to be technical, business, engineering, scientific, or financial.
Allowd FBI to begin investigating industiral and corporate espionage cases. |
|
|
Term
|
Definition
| Reasonable Expectation of Privacy. |
|
|
Term
|
Definition
It is an act or omission that naturally and directly produces a consequence.
It refers ro causes that lead directly to a particular result.
Can be seen as negligence in a court of law. |
|
|
Term
| What are the stages of incident response? |
|
Definition
Triage
Investigation
Containment
Analysis
Tracking
Recovery |
|
|
Term
| What is triage in the incident response process? |
|
Definition
| It is the inital sceening to dtermine if an event is an incident. |
|
|
Term
| Wha occurs during the Containment process in incident response processes? |
|
Definition
Damage mitigation takes place.
The containment strategy is based on the category of attack.
|
|
|
Term
| What occurs during the Tracking process in incident response processes? |
|
Definition
| During this stage it is determined whether the source of the incident was internal or external and how the offender gained access to the network. |
|
|
Term
| What occurs during the Recovery process in incident response processes? |
|
Definition
| Necessary fixes are implemented to ensure that type of incident can not occir again. |
|
|
Term
| What is computer forensics? |
|
Definition
| It is specialized techniques for the recovery, authentication, and analysis of electronic data for the purposes of a digitial criminal investigation. |
|
|
Term
| What are the different types of assesments an investigator can perform? |
|
Definition
Network Analysis
Communication Analysis
Log Analysis
Path Tracing
Media Analysis
Disk imaging
MAC time analysis
Content Anaylsis
Software Analysis
Reverse engineering
Malicious code review
Exploit review
Hardware analysis
Dedicated appliance attack points
Firmware and dedicated memory inspections
Embeded operating systems analysis |
|
|
Term
| What are the steps of the forensic investigation process? |
|
Definition
Identification
Preservation
Collection
Examination
Analysis
Presentation
Decision |
|
|
Term
| What is a chain of custody? |
|
Definition
| It is a history that shows how evidence was collected, analyzed, transported, and preserved in order to be presented in court. |
|
|
Term
|
Definition
|
|
Term
| What is computer-related documents considered? |
|
Definition
|
|
Term
|
Definition
Primary evidence used in a trial because it provdes the most reliability.
Example would be an orignal signed contract. |
|
|
Term
| What is Secondary Evidence? |
|
Definition
It is not viewed as reliable in proving innocence or guilt.
Examples are oral evidence, and copies of original documents. |
|
|
Term
|
Definition
It can prove a fact by itself and does not need supporting information.
Example is a witness to a crime. |
|
|
Term
| What is Conclusive Evidence? |
|
Definition
| It is irrefutable and connot be contradicted. It does not require corroboration. |
|
|
Term
| What is Corroborative Evidence? |
|
Definition
| It is supportive evidence to prove an idea or point. |
|
|
Term
| What is the opinion rule? |
|
Definition
| It dictates that a witness must testify to only the facts of the issue and not their opinion of the facts. |
|
|
Term
| What is hearsay evidence? |
|
Definition
| It pertains to oral or written evidence presented in court that is secondhand and has no firsthand proof of accuracy or reliability. |
|
|
Term
|
Definition
| It is an attack in which the attacke commits several smal crimes with the hope that the overall larger crime will go unnoticed. |
|
|
Term
|
Definition
| It is the alteration of existing data. |
|
|
Term
| What is password Sniffing? |
|
Definition
| It is sniffing network traffic with the hope of capturing passwords being sent between computers. |
|
|
Term
|
Definition
| It takes place when someone purchases a domain name with the goal of hurting a company with a similar domain name or to carry out extortion. |
|
|
Term
|
Definition
| Internet Architecture Board. |
|
|
Term
| What is a mixed law system? |
|
Definition
| It uses two or more legal systems. |
|
|
Term
| What are logon banners used for? |
|
Definition
| They are used to inform users what could happen if they do not follow rules pertaining to using company resources. |
|
|
Term
|
Definition
|
|
Term
| What are the stages of the System Development Life Cycle? |
|
Definition
Initiation-Need for a new system is defined.
Acquisition/Development- System is created or purchased.
Implementation- New system is installed
Operation/Maintenance- System is used and cared for
Disposal- System is removed from production |
|
|
Term
|
Definition
| System Development Life Cycle |
|
|
Term
| What are the requirements of SDLC? |
|
Definition
Requirement gathering- Determine why software is being created, what it will do, and for who it will be created for.
Design- Deals with how the software will accomplish the goals identified
Development- Programming software code to meet specifications laid out in design phase.
Testing- Validation software to ensure goals are met.
Release- Deploying the software and ensuring it is properly configured. |
|
|
Term
| How many privacy impact ratings are there? |
|
Definition
|
|
Term
| What is the P1 privacy impact rating? |
|
Definition
High Privacy Risk.
The product or service sotres or transmits Personally Identifiable Information (PII) |
|
|
Term
| What is the P2 Privacy Impact rating? |
|
Definition
Moderate Privacy risk.
The sole behavior that affects privacy in the feature, product, or service is a one-time user initiated anonymous data transfer. |
|
|
Term
| What is the P3 Privacy Impact Rating? |
|
Definition
Low Privacy Risk.
No behaviors exist within the product that affect privacy.
No anonymous or personal data is transferred. |
|
|
Term
| What is an attack surface? |
|
Definition
| It is what is available to be used by an attacker against the product itself. |
|
|
Term
| What is an attack surface analysis? |
|
Definition
| It is used to identify and reduce the amount of code and functionality accessible to untrusted users. |
|
|
Term
| What is dynamic analysis? |
|
Definition
| It is the evaluation of a program in real time. |
|
|
Term
| What is the difference between verification and validation? |
|
Definition
Verification determines if the product accurately represents and meets specifications.
Validation dterimes if the product provides the necessary solution for the intended real-world problem. |
|
|
Term
| What is a Zero-Day vulnerability? |
|
Definition
| They are vulnerabilities that do not currently have a resolution. |
|
|
Term
|
Definition
| It is a technique used to discover flaws and vulnerabilities in software. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| It describes the product and customer requirements. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A project management tool used to define and group a projects individual work elements in an organized manner. |
|
|
Term
|
Definition
| Storing of the source code of software with a third party escrow agent. |
|
|
Term
|
Definition
| The process of controlling the changes that take place during the life cycle of a system and documenting the necessary change control activities. |
|
|
Term
| What is Software Configuration Management |
|
Definition
| It identifies the attributes of software at various points in time, and perofrms a methodical control of changes |
|
|
Term
| What is a garbage collector? |
|
Definition
| It ism blocks of memory that were once allocated but are no longer in use and deallocates the blocks and marks them as free. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A model developed by Microsoft that allows for interprocess communication between applications potentially written in different programming languages. |
|
|
Term
|
Definition
| Object Linking and Embedding |
|
|
Term
|
Definition
| It provides a way for objects to be shared on a local computer and to use COM as their foundation. |
|
|
Term
| What is Data Warehousing? |
|
Definition
| It combines data from multiple databases or data sources into a large database for the purpose of providing more extensive information retrieval and data analysis. |
|
|
Term
| What is an Artifical Neural Network? |
|
Definition
| A mathematical or computational model based on the nueral structure of the brain. |
|
|
Term
|
Definition
| It is a virus written in one of these macro language and is platform independent. |
|
|
Term
| What is a Compression Virus |
|
Definition
| It is a virus that appends itself to a executable on the system. |
|
|
Term
|
Definition
| It is files that are executed by an interpreter. |
|
|
Term
| What is a Tunneling Virus? |
|
Definition
| It is a type of virus that attempts to install itself under the antivirus program. |
|
|