Term
| What is a Deauthentication Attack? |
|
Definition
| Sending specially crafted traffic to both a wireless client and an access point in the hopes of causing them to deauthenticate and disconnect. |
|
|
Term
|
Definition
| An initialization Vector attack involves attempting to break WEP keys by targeting their weak IV's |
|
|
Term
| The minimum password age setting is used for what? |
|
Definition
| to force users to have a password for a minimum amount of time before they can change it so they can't rapidly cycle through them and use an old password. |
|
|
Term
| What is MTTF? and what does it imply? |
|
Definition
the Mean Time to Failure is the length of time a device is expected to last in operation.
Only a single, definitive failure will occur and will require that device to be replaced rather than be repaired. |
|
|
Term
| What are the steps in the Incident Response Life Cycle? |
|
Definition
1. Preparation
2. Detection & Analysis
3. Containment
4. Eradication
5. Recovery
6. Post Incident Activity |
|
|
Term
| How do Threats effect Elements of Risk? |
|
Definition
| By exploiting Vulnerabilities. |
|
|
Term
|
Definition
| A False Reject Rate is a type 1 error caused by Rejecting an Authorized user |
|
|
Term
|
Definition
| A False Acceptance Rate is a type 2 error caused by Authorizing an un-authorized user. |
|
|
Term
| What can Content Filters do? |
|
Definition
| Scan content as it leaves the network, checking for certain types of content that has been pre-specified within the software (Block personal emails etc). |
|
|
Term
| 99.99% availability accounts for how much downtime per year? |
|
Definition
52 minutes.
.0001 x (365 x 24 x 60) |
|
|
Term
|
Definition
| Layer Two Tunneling Protocol aligns to TCP port 1701, allowing secure remote access to a system through a VPN Connection (i.e HTTP over SSL is 443) |
|
|
Term
| A double-blind test implies what? |
|
Definition
| that Testers have no prior knowledge of the network and the defenders have no prior knowledge of the test and aren't aware of any attacks unless they can detect & defend against them. |
|
|
Term
| both ____ and ____ protocols are used to encrypt traffic sent over untrusted networks, such as the internet. |
|
Definition
| Transport Layer Security (TLS) & Secure Sockets Layer (SSL) |
|
|
Term
| what driver will work correctly, but also might perform other, malicious actions? |
|
Definition
|
|
Term
| DES is what and how many rounds of encryption does it perform? |
|
Definition
| The Data Encryption Standard, it performs 16 rounds of encryption on Plaintext. |
|
|
Term
| IMAPS is a secure version of what protocol used over SSL and TLS? |
|
Definition
|
|
Term
| As Security Increases, ____ Decreases |
|
Definition
|
|
Term
| As Resources Decrease, both ___ & ____ Decrease |
|
Definition
| Functionality and Security |
|
|
Term
| What takes place at the security requirements stage of the Sec Dev model? |
|
Definition
| Requirements gathering, analysis, & diagram development |
|
|
Term
| Risk Assesment means evaluating what? |
|
Definition
|
|
Term
|
Definition
| Online Certificate Status Protocol is used to obtain the revocation status of digital certificates |
|
|
Term
| Credential Validation is what part of AAA? |
|
Definition
|
|
Term
|
Definition
| Password Authentication Protocol is an older auth method that passes passwords and usernames in Cleartext |
|
|
Term
| What does a Deterrent Control do? |
|
Definition
| It keeps someone from performing a malicious act, provided that he or she knows the control is there and is aware of the consequences. |
|
|
Term
| When information is converted to an unreadable state using Cryptography, what is it called? |
|
Definition
|
|
Term
| what is LDAP and what port does it use? |
|
Definition
Lightweight Directory Access Protocol - TCP 389
known as a directory or phonebook of your network resources |
|
|
Term
| Pharming is an example of what? |
|
Definition
| A form of DNS attack that redirects a websites traffic to another, fake site. |
|
|
Term
|
Definition
| a secure version of the non-secure FTP protocol and is used over SSL & TLS. SFTP is the same but uses SSH. |
|
|
Term
|
Definition
| Elliptic Curve Diffie-Hellman is a key exchange protocol used in public key cryptography. It is used to negotiate, agree upon, and establish a secure session between two parties. |
|
|
Term
| ____ is the 2nd iteration of the Secure Hashing Algorithm and is used to generate message digests for plaintext |
|
Definition
|
|
Term
| What systems are used to control and manage heating, ventilation, air-conditioning & other types of industrial & environmental systems? |
|
Definition
| SCADA - Supervisory control and data acquisition. |
|
|
Term
|
Definition
| Pretty Good Privacy - commonly used between individuals or small groups and normally does not require a PKI. Uses a web of trust model, which means that each individual has to be able to trust every other individual who uses PGP to encrypt or decrypt data sent & received by them. |
|
|
Term
| Kerberos helps prevent what kind of attacks? |
|
Definition
| Replay Attacks. It uses tickets and timestamps. |
|
|
Term
| WEP Keys use how many bits? |
|
Definition
64 & 128. (40 bit key, 24 bit Initialization Vector)
(104-bit and 24 bit IV).
802.11 used 64-bit. |
|
|
Term
| ___ uses RC4 streaming protocol and weak IV's (24-bits) to encrypt data on wireless networks |
|
Definition
|
|
Term
| What do government entities use as more formal document than an MOU? |
|
Definition
| ISA's. Interconnection Service Agreement |
|
|
Term
| What is the initialization vector size of TKIP? |
|
Definition
|
|
Term
| Why does examining MAC addresses on filtering logs not be a good method for detecting unauthorized (rogue) hosts connected to a network? |
|
Definition
| because MAC Addresses can be spoofed and filtering logs may not provide any indication of whether a host is authorized or not. |
|
|
Term
| What is the simplest method of testing for disaster recovery? |
|
Definition
|
|
Term
| Signage should indicate the location and route to emergency evac exits, and not what? |
|
Definition
|
|
Term
| What is an example of a Trusted OS? |
|
Definition
SELinux
Windows 7
MAC OS X 10.6 |
|
|
Term
| What is normally required to convert and read coded messages? |
|
Definition
|
|
Term
|
Definition
| It separates applications from one another and does not allow them to share execution, user, or data space. |
|
|
Term
| Networks are typically separated for security purposes either ____ or ____ or both. _____ separation involves separating them through segmented IP Subnetworks. |
|
Definition
Physically or Logically.
Logical separation. |
|
|
Term
|
Definition
| Recovery Point Objective - the maximum allowable amount of data in terms of time that the organization can afford to lose during a disaster or incident. |
|
|
Term
| To encrypt data that Dawn can decrypt using public and private key pairs, Bob would need what to encrypt data that only her private key can decrypt? |
|
Definition
|
|
Term
| What Cloud is operated by a third-party who leases space to anyone who needs it? |
|
Definition
|
|
Term
|
Definition
Cipher Block Chaining.
adds initialization vector to a key to ensure that the output block is uniquely different. |
|
|
Term
|
Definition
Cipher Feedback
Takes the IV and encrypts, then XORs the output to the first block |
|
|
Term
|
Definition
| Plaintext that is converted into 16, 64, or 128-bit binary ciphertext |
|
|
Term
| In what type of disaster recovery test do team members go through the motions of fulfilling responsibilities and conducting the activities required during an actual incident or disaster? |
|
Definition
|
|
Term
| If a user keeps getting new privileges yet nothing is turned off, what could this imply? |
|
Definition
| Privilege Creep - the gradual accumulation of access rights beyond what an individual needs to do his job. |
|
|
Term
| A Layer _ switch can help interconnect multiple VLANs because it supports inter-vlan routing |
|
Definition
|
|
Term
| What system of trust involves the use of a common authentication system and credentials database that multiple entities use and share? |
|
Definition
| A Federated System of Trust |
|
|
Term
| a ________ isn't a trust relationship, it is a method to handle trust for certificates. |
|
Definition
|
|
Term
| What 2 things are a cryptographic representation of variable length text, but are not the text itself? |
|
Definition
| A Hash and Message Digest. |
|
|
Term
| What form of 802. is a port-based authentication method? |
|
Definition
|
|
Term
|
Definition
| Rivest-Shamir-Adleman is the most common public-private key generation algorithm used in Public Key Cryptography. It is used to generate public and private key pairs. |
|
|
Term
| What does Inculpatory Evidence prove? |
|
Definition
|
|
Term
| What does exculpatory Evidence prove? |
|
Definition
|
|
Term
| What can be established through effective security controls and well-written service-level agreements in a cloud environment? |
|
Definition
| Accountability & Responsibility |
|
|
Term
| What type of attack targets relational databases that reside behind web applications? |
|
Definition
|
|
Term
| What type of attack targets directory services databases, such as those used in X.500 implementations? |
|
Definition
|
|
Term
| What technique is used to change weak keys to stronger ones by feeding them into an algorithm to produce an enhanced key? |
|
Definition
|
|
Term
| What involves sending individual characters of a key through an algorithm and using mathematical XOR function to change the output? |
|
Definition
|
|
Term
|
Definition
| a symmetric algorithm that was one of the five finalists for the government competition for the new AES standard. But did not win. |
|
|
Term
| What uses labels and security clearances to grant access to objects? |
|
Definition
| Mandatory Access Control (MAC) |
|
|
Term
| What is saved and used by load balancers to maintain a connection between a specific client and a specific server, i.e session affinity |
|
Definition
|
|
Term
|
Definition
| A Security Identifier is a unique number assigned to each individual user account. it's never used, even when an account is deleted and re-created. UIDs and GIDs are for linux and unix system users and groups. |
|
|
Term
|
Definition
| Access Control Entry - is a unique entry in an ACL that describes a users permissions for accessing objects. |
|
|
Term
| What type of analysis cannot identify patterns alone and requires other data and event sources to identify Trends & Patterns? |
|
Definition
|
|
Term
| What type of analysis involves looking at data from various sources, including device logs, to identify patterns over a period of time. |
|
Definition
|
|
Term
| Quantitative and Qualitative are examples of ____ |
|
Definition
| Risk Assessment Techniques |
|
|
Term
| To provide continuous power in case of a disaster or incident, what would you need? |
|
Definition
|
|
Term
| Disabling ICMP will prevent what? |
|
Definition
| Security issues caused by having Ping and Traceroute Enabled. |
|
|
Term
| What backups apply to entire systems and are used to back up files that have changed since the last full backup? |
|
Definition
| Differential and Incremental |
|
|
Term
|
Definition
| Diffie-Hellman Exchange - a key negotiation and agreement protocol used in public key cryptography. |
|
|
Term
|
Definition
Elliptic Curve Cryptography - a public key cryptography protocol that can be used on small mobile devices because of its low power and computing requirements.
creates a smaller key than RSA with the same security and increased performance |
|
|
Term
| What is Containerization? |
|
Definition
| The process of virtualizing the operating system. Containers often use storage and segmentation to separate sensitive personal data. |
|
|
Term
| ____ is not used in public key cryptography |
|
Definition
|
|
Term
| What involves a third-party that holds a special third key in addition to your private and public key pair? |
|
Definition
|
|
Term
|
Definition
Common Access Control card.
Used by the D.O.D. as a specific form of personal identification verification (PIV) |
|
|
Term
| What is a low-cost solution that enables encrypted e-mail messages? |
|
Definition
|
|
Term
|
Definition
| Mean Time to Recovery is the amount of time it takes for a hardware component to recover from a failure. |
|
|
Term
| in what type of test do the testers have no knowledge of the details about the network configuration, but defenders are aware of their presence? also referred to as a blind-test |
|
Definition
|
|
Term
| What are the steps of Identification in terms of Incident Response? |
|
Definition
1. Recognize Incident
2. Reports from users
3. Check Monitoring tools
4. watch alerts and logs
5. Assess the impact
6. Define who's involved |
|
|
Term
| What are the steps of Containment in terms of Incident Response? |
|
Definition
1. Mitigate Damage
2. Stop the Attack
3. Segregate the network
4. Shutdown the system
5. Turn off a service |
|
|
Term
| What are the steps of Eradication in terms of incident response? |
|
Definition
1. Remove the malware
2. Close off Vulnerabilities.
3. Add new controls |
|
|
Term
| What are the steps of recovery in terms of incident response? |
|
Definition
Restore from backups
Pull from snapshots
Hire replacement personnel
Monitor to ensure good operations |
|
|
Term
| What is the Chain of Custody for digital forensics? |
|
Definition
1. Define the Evidence
2. document the collection method
3. date/time collected
4. person(s) handling the evidence
5. Function of person handling evidence
6. All locations of the evidence |
|
|
Term
| What is the processes of Forensic Data Acquisition? |
|
Definition
1. Capture system image
2. network traffic & logs
3. Capture Video
4. Take Hashes
5. take screenshots
6. interview witnesses
7. track man hours |
|
|
Term
| What are the four types of Threats? |
|
Definition
Adversarial - hacker, malware
Accidental - User or Admin Mistake
Structural - PSU Dies, Equipment failure
Environmental - Disasters, fires, etc |
|
|
Term
|
Definition
| Challenge Handshake Protocol - Uses password hashes and challenge methods to authenticate to the system. |
|
|
Term
|
Definition
self-contained applications that can communicate with network resources that have been explicitly allowed.
They run isolated instances of programs and services and can depend on each other or be configured to communicate with each other on a single host |
|
|
Term
|
Definition
| it is an authentication tool for DNS that prevents MIM attacks, not an encryption method. |
|
|
Term
| What is the Waterfall method in regards to secure code development? |
|
Definition
Requirements
Design
Implementation
Verification
Maintenance |
|
|
Term
|
Definition
| Automation tools, change management, baselining, consideration for VM setup and system variations. |
|
|
Term
| What is a Stored Procedure in terms of coding? |
|
Definition
| Reuse of a code module that is called from within the program to perform a repetitive action. |
|
|
Term
| Third party libraries for coding should be considered as what? |
|
Definition
|
|
Term
| Code can be executed how? |
|
Definition
| With a .exe file on a machine, or directly from a web site that is coded as a runtime application |
|
|
Term
| What are the 7 Social Engineering Principles? |
|
Definition
| Authority, Intimidation, Consensus, Scarcity, Familiarity, Trust, and Urgency |
|
|
Term
|
Definition
Acceptable Use Policy
Defines what a person can and cannot do when using company assets. |
|
|
Term
| What does Data Classification define? |
|
Definition
| The importance or nature of the data |
|
|
Term
| What does an Access Control Policy define? |
|
Definition
- How to get access to data or resources
- What type of data users have access to
|
|
|
Term
| What does a Password Policy Define? |
|
Definition
- Password Recovery
- Bad Login
- Password Retention
- Password Reuse
|
|
|
Term
| What is BIA and what are the processes? |
|
Definition
Business Impact Analysis
- Determine Mission Processes
- Identify critical systems
- Single point-of-failure
- Identify resource requirements
- Identify recovery priorities
|
|
|
Term
|
Definition
Privacy Impact Assessment
What will be impacted if Privacy is compromised. |
|
|
Term
|
Definition
Privacy Threshold Assessment
to help avoid privacy impact issues by running an assessment on Privacy data.
|
|
|
Term
| What can measure Impact on a business? |
|
Definition
| Property/equipment, asset loss, productivity cost, and financial effect. |
|
|
Term
|
Definition
Business Partners Agreement
- Primary Entities
- Time Frame
- Financial Issues
- Management
|
|
|
Term
|
Definition
Service Level Agreement
- Service to be provided
- Minimum up-time
- Response Time
- Start & End Date
|
|
|
Term
|
Definition
Interconnection Security Agreement
from (NIST 800-47)
1. Statement of Requirements
why and who is interconnecting?
2. System Security Considerations
What info is connecting?
Where is the info going?
What services are involved?
What encryption is needed?
3. Topological Drawing
4. Signature Authority.
Most ISA's are reinforced with an MOU
|
|
|
Term
|
Definition
Memorandum of Understanding/Agreement
1. Purpose of the interconnection
2. Relevant Authorities
3. Specify the responsibilities
4. Define the terms of the agreement
5. Termination/Reauthorization |
|
|
Term
|
Definition
| way to store certificates as individual files |
|
|
Term
|
Definition
| certificates and private keys as a package |
|
|
Term
|
Definition
| Passwords, PIN codes, Captcha, Security Questions |
|
|
Term
|
Definition
| Smart Card or RSA Key (or token) |
|
|
Term
|
Definition
| Biometrics (fingerprint scanners, facial recognition, etc) |
|
|
Term
|
Definition
| Typing rhythm for password entry, etc (how you do something) |
|
|
Term
|
Definition
| Validation based on location (credit card fraud, etc) |
|
|
Term
|
Definition
| Known systems establishing trust through other trusted systems |
|
|
Term
| What is NIDS? and what are the 4 methods of detection? |
|
Definition
Network Intrusion Detection System
it is passive and typically is out-of-band
1. Behavioral/Anomaly
2. Signature-based
3. Rule-based
4. Heuristic - Combines anomaly and signature |
|
|
Term
|
Definition
Network Intrusion Prevention System
Active\inline
typically in-band
|
|
|
Term
| What is a Collector in regards to Network Intrusion Detection/Prevention? |
|
Definition
| It stores data from sensors/monitors into a collective database to be analyzed. |
|
|
Term
| What are Correlation engines? |
|
Definition
| the tools that check for behavioral anomalies and other methods of network intrusion detection |
|
|
Term
|
Definition
| a packet sniffer for network monitoring that plugs directly between a switch, firewall, and network monitoring tool |
|
|
Term
| What are the 5 Secure OS Types? |
|
Definition
Server Operating Systems
Workstations
Embedded Systems (appliance)
Kiosk
Mobile OS |
|
|
Term
| What is SIEM and the 3 terms related to it? |
|
Definition
Security Information and Event Management
Aggregation and Correlation
Normalization |
|
|
Term
|
Definition
| an intelligent device designed to do a specific task or process |
|
|
Term
|
Definition
| Industrial Control System |
|
|
Term
| What key is used for nonrepudiation? |
|
Definition
|
|
Term
|
Definition
the ability to ensure that a party cannot deny the authenticity of their signature on a message or document.
to repudiate means to deny. |
|
|
Term
| What are 2 examples of Secure Hashing Algorithms? |
|
Definition
|
|
Term
| What are 2 examples of Symmetric encryption Algorithms? |
|
Definition
|
|
Term
| What type of poisoning involves modifying inappropriate entries in a system cache that stores an IP address corresponding to a MAC address? |
|
Definition
| ARP Poisoning spoofs MAC addresses by adding false entries into the hosts ARP cache |
|
|
Term
|
Definition
| A collision occurs when two pieces of plaintext are hashed and produce identical hashes. |
|
|
Term
| What is a security reason to perform a site survey to identify Rogue Access Points? |
|
Definition
| Rogue APs can be used to get onto a network and bypass security controls such as firewalls. |
|
|
Term
|
Definition
Maximum Tolerable Downtime
Indicates how long an asset may be down or offline without seriously impacting the organization. |
|
|
Term
|
Definition
| an attacker attempting to take control of or use a bluetooth enabled device to place calls |
|
|
Term
|
Definition
| the act of sending unsolicited messages or files to a bluetooth device |
|
|
Term
|
Definition
| unauthorized access to information on a bluetooth device |
|
|
Term
|
Definition
| Reverse Address Resolution Protocol - it resolves MAC addresses to IP addresses instead of vise-versa |
|
|
Term
| What is a security issue but is not specific to any application? |
|
Definition
|
|
Term
| What should be used when connecting to untrusted networks such as wifi at hotel? |
|
Definition
|
|
Term
| What port does the IKE Protocol use for the SA setup within IPsec? |
|
Definition
| the Internet Key Exchange protocol uses port number 500 for the Security Association setup within ipsec. |
|
|
Term
| A term used to identify an authentication scheme that involves both sides of the communication authenticating is: |
|
Definition
|
|
Term
| Implicit Deny means that: |
|
Definition
| Anything that is not specifically allowed is denied by default. |
|
|
Term
|
Definition
a Host-based Intrusion Detection System
it monitors local system activity and logs for indications of an attack |
|
|
Term
| If Bob sends a message to Sue, what is used to encrypt the message? |
|
Definition
|
|
Term
|
Definition
| a type of DDOS attack where large amounts of ICMP ping packets are sent from a spoofed ip address on the network to the network broadcast address (victims ip). possibly causing a denial of service. |
|
|
Term
| What is used to verify the integrity of a message? |
|
Definition
|
|
Term
What are 3 valid 5.0 Risk Management Strategies?
|
|
Definition
| Transference, Mitigation, and Acceptance |
|
|
Term
| What does Insurance mean in relation to Risk? |
|
Definition
| a method of risk transference where an organization pays a premium for an insurance company to assume risk. |
|
|
Term
| RADIUS Encrypts _____ and TACACS encrypts _____ |
|
Definition
| Only Passwords, All info between client and server |
|
|
Term
|
Definition
| the risk that remains after all mitigation and reduction strategies have been implemented. |
|
|
Term
| What would prevent a user from logging on to a network that has outdated Patches or Antivirus signatures? |
|
Definition
| NAC. Network Access Control |
|
|
Term
| To prevent Cross-site scripting (XSS) attacks, what would be the best method of defense? |
|
Definition
| Validating the input into a web site for illegal characters in a particular field. |
|
|
Term
Note the algorithms in order for :
AES & 3DES
RSA
MD5 & SHA-1 |
|
Definition
Symmetric
Asymmetric
Hashing |
|
|
Term
| a TPM is best described as: |
|
Definition
| A Trusted Platform Module is best described as a hardware module that performs cryptographic functions |
|
|
Term
|
Definition
| an application vulnerability testing technique that sends invalid or unexpected data to the application, with the intent to see if any security vulnerabilities exist. |
|
|
Term
| What is a password token when used by itself? |
|
Definition
a one-time password authenticator
if combined with another password it would be multi-factor |
|
|
Term
| What is the type of attack when a server is flooded by ICMP Echo request packets? |
|
Definition
|
|
Term
| What type of attack typically listens on an open inbound connection sometimes with ports 135 and 445? |
|
Definition
| Remote Access Trojan (RAT) |
|
|
Term
| Whats the best method to manage multiple passwords? |
|
Definition
| A password manager (keepass, password vault manager etc) |
|
|
Term
| What type of attack sends different messages using the same hash function trying to cause a collision? |
|
Definition
|
|
Term
| Where are Macro Viruses found? |
|
Definition
|
|
Term
| What central system includes a firewall, IDS, antivirus, and more? |
|
Definition
| a Unified Threat Management (UTM) system. |
|
|
Term
|
Definition
| Logical Controls. they can be used to restrict data access like applications, devices, and encryption |
|
|
Term
| What is Containerization in terms of a mobile device? |
|
Definition
| It establishes secure isolated connections to apps & isolates the rest of a mobile device |
|
|
Term
| What's the most significant disadvantage to federated identities? |
|
Definition
| Transitive Trust. the security of federated identities is impacted by the security of others |
|
|
Term
| a ____ is submitted to a ___ to request a digital signature |
|
Definition
| Certificate Signing Request (CSR) to a Certificate Authority (CA) |
|
|
Term
| What is a Buffer overflow attack? |
|
Definition
| Sending more data to a target than it can hold |
|
|
Term
| What could be done if an employee is tethering his phone to bypass wireless security? |
|
Definition
| Implementing a policy against tethering in the workplace |
|
|
Term
| What would be the best method to mitigate a password cracker if someone is worried about passwords being cracked? |
|
Definition
| An Account Lockout Policy that locks the account if there are multiple attempts. |
|
|
Term
| What would be the best method to manage patches, configurations, and software installations/updates/maintenance in a single location? |
|
Definition
| A Virtual Desktop Environment |
|
|
Term
| What is a CER and what does it describe? |
|
Definition
| a Crossover Error Rate and it describes the point at which false rejections and false acceptances are equal. |
|
|
Term
| What is XSS and what does it involve? |
|
Definition
| Cross-Site Scripting and it involves the use of Java-script |
|
|
Term
| Whats the best method to handle input validation? |
|
Definition
| Fuzzing. Having a tester enter the wrong info intentionally to see how the application will process or handle data. |
|
|
Term
| If you need to validate a certificate without consuming bandwidth, what would be used? |
|
Definition
| a Certificate Revocation List (CRL) can be used to provide a list that's been revoked without consuming bandwidth (OCSP) is a protocol. |
|
|
Term
| What ciphers work similar to one-time pads? |
|
Definition
|
|
Term
| What type of system has a configuration that cannot be changed? |
|
Definition
|
|
Term
| Filtering user input would be the best method to prevent what? |
|
Definition
| XSS (cross-site scripting) and SQL attacks. |
|
|
Term
| Half-open connections on a firewall are classic examples of what type of attack? |
|
Definition
|
|
Term
| What would be the best method to prevent unapproved technologies such as USB drives in the work place? |
|
Definition
| a Data Loss Prevention (DLP) policy |
|
|
Term
| What's the least secure hashing algorithm? |
|
Definition
|
|
Term
| What helps prevents replay attacks and session hijacking? |
|
Definition
|
|
Term
| What is an appropriate method of handling an employee when wrongdoing has been found? |
|
Definition
| take Adverse Actions (leave w/w/out pay, etc) |
|
|
Term
| as an employee, using a Corporate Owned Personally Enabled phone, what is the risk involved? |
|
Definition
| Having your personal information exposed at work, etc. |
|
|
Term
| What can help best against DHCP starvation attacks started by "gobbler" software? |
|
Definition
| Network Address Allocation |
|
|
Term
| What would be the best method of low-impact security for mobile devices used by guests that are connecting to a businesses wi-fi temporarily? |
|
Definition
Network Access Control (NAC) can perform health checks on mobile devices to make sure they meet the minimum security standards prior to connecting.
a Dissolvable nac would work best in this case |
|
|
Term
| What would assist in granting you the source code if a vendor you were working with went out of business? |
|
Definition
|
|
Term
| Whats the most volatile parts of a machine in terms of forensics? |
|
Definition
1. Processor Cache
2. RAM
3. Swap File
4. HDD |
|
|
Term
| What are 4 Symmetric key block cipher algorithms? |
|
Definition
|
|
Term
| Whats a Symmetric Key Algorithm that uses a Stream (1 bit at a time) Cipher instead of block? |
|
Definition
|
|
Term
What's the block size of DES, 3DES, and Blowfish?
|
|
Definition
|
|
Term
| Whats the block size of AES? |
|
Definition
|
|
Term
| Whats they key size of DES and 3DES? |
|
Definition
|
|
Term
What's the key size of Blowfish?
|
|
Definition
|
|
Term
| What are the possible key sizes of AES? |
|
Definition
|
|
Term
| What is they key size range of RC4? |
|
Definition
|
|
Term
|
Definition
a symmetric block mode called Counter
it uses a nonce number + an increasing counter value in binary and encrypts that |
|
|
Term
|
Definition
an Asymmetric Algorithm
Provides a method for 2 parties to come up with same Session Key.
key exchange agreement (or protocol)
Using shared secrets, i.e colors. |
|
|
Term
| What is a Rainbow-Table Attack? |
|
Definition
| a type of hack using a rainbow hash table (precomputed lookup table for storing password hashes) to crack passwords in a database. |
|
|
Term
| What would be 4 useful security options for a COPE phone? |
|
Definition
Cellular data, remote wipe, Location Tracking, MDM.
Mobile Device Management allows patches and updates remotely. |
|
|
Term
| What's the biggest issue with a 6 character password thats 2 years old and has no history being maintained? |
|
Definition
| the 6 character length of the password |
|
|
Term
| if computers were zombies in a botnet, what attack would they be performing? |
|
Definition
|
|
Term
| What occurs when you exploit one machine and use it to exploit another? |
|
Definition
|
|
Term
| If files are encrypted by a no-longer employed user, what could be used to decrypt them? |
|
Definition
|
|
Term
| What wifi technology provides max security while supporting older devices? |
|
Definition
|
|
Term
Lighting is a ____
Audit logs, Alarms, and a antivirus scanner are examples of _____ |
|
Definition
Deterrent control
Detective controls |
|
|
Term
| if an attacker is able to enumerate all your networks resources and able to make some unavailable, what protocl would best mitigate the attack?? |
|
Definition
| LDAP - because it is considered to be a directory or phonebook of your network. |
|
|
Term
| SSL is much older than ___ |
|
Definition
|
|
Term
|
Definition
| Data Execution Prevention is a resource that monitors programs that access system memory and prevent them from doing so. |
|
|
Term
| Spear Fishing targets a ____ |
|
Definition
|
|
Term
| The most important principle in managing account permissions is what? |
|
Definition
| Account Recertification. this certifies that permissions still need to be granted. |
|
|
Term
| What automatically updates browsers with a list of certificates for applications? |
|
Definition
|
|
Term
| What verifies requests for certs and forwards the responses? |
|
Definition
| a Registered Authority or Root Authority (RA) |
|
|
Term
RAID 1+0 =
Raid 6 =
raid 1 =
Raid 0 = |
|
Definition
Stripe of mirrors
Striping with dual parity
Mirror
Striping
|
|
|
Term
What does Quantitative Risk Assessment do?
|
|
Definition
Assigns numerical values from impacts |
|
|
Term
| What does Qualitative Risk Assessment do? |
|
Definition
| Determines and ranks the quality such as a high/medium/low risk |
|
|
Term
| What Wi-Fi standard was used to implement the requirements of 802.11i ? |
|
Definition
|
|
Term
| an Out-of-band NIDs does what? |
|
Definition
| Places the management system on a different network. This would help the detection process be invisible to an attacker. |
|
|
Term
| What is a type 1 hypervisor known as? |
|
Definition
"Bare Metal"
it runs on the system hardware |
|
|
Term
| What does a type 2 hypervisor run on? |
|
Definition
|
|
Term
| What is a low-level, low skilled hacker known as? |
|
Definition
|
|
Term
|
Definition
| A process where someone connects to a web server and gathers information by "grabbing their banner" which can be done through netcat |
|
|
Term
What box test uses minimal information
|
|
Definition
|
|
Term
| What box test uses complete information? |
|
Definition
|
|
Term
| what are the numbered types of authentication? |
|
Definition
Type 1: something you know (password)
Type 2: something you have (smart card)
Type 3: something you are (biometrics) |
|
|
Term
| you shouldn't include ____ in usernames |
|
Definition
|
|
Term
| what key is used to encrypt the hash digest of an email to create a digital signature? |
|
Definition
|
|
Term
| Root kits can affect boot sectors, but a machine forceably booting is most likely the cause of a ___ |
|
Definition
|
|
Term
| What type of controls are testing and training a part of? |
|
Definition
| Preventative Administration Controls |
|
|
Term
| What tool is a packet sniffer for linux? |
|
Definition
|
|
Term
| What type of control can be forced on an OS and cannot be overridden or accessed by users? |
|
Definition
|
|
Term
| What document would describe reliability and recourse if reliability isn't met? |
|
Definition
| a Service Level Agreement (SLA) |
|
|
Term
| What ports would you open and block for a web application firewall to only allow encrypted web traffic? |
|
Definition
| Open 443 and 23 and block port 80 |
|
|
Term
| What system has a major benefit that detects if files have been altered? |
|
Definition
|
|
Term
|
Definition
| Platform as a service provides consumers with the infrastructure for hosted applications. It is an OS service |
|
|
Term
|
Definition
| Full fault tolerance with striping |
|
|
Term
|
Definition
| Striping with dedicated parity |
|
|
Term
| Wearable devices can be used to cary ____ in and out of a company |
|
Definition
|
|
Term
| The best bios integrity technique is what? |
|
Definition
|
|
Term
| WPA uses what method for authentication? |
|
Definition
| TKIP - Temporal Key Integrity Protocol |
|
|
Term
| What Wifi security standards use CCMP? |
|
Definition
| WPA2 & AES - Counter Mode Cipher Block Chaining Message Authentication Protocol |
|
|
Term
|
Definition
| the process of deprovisioning resources as needed in order to make room for other resources |
|
|
Term
| What Is not a part of password complexity? |
|
Definition
|
|
Term
| whats the best method to document how users use their account permissions? |
|
Definition
|
|
Term
| Whats a physical access method that uses asymmetric cryptography to authorize users? |
|
Definition
| a Challenge Response Token |
|
|
Term
| a Char_user_input[20] code line could be vulnerable to what type of attack? |
|
Definition
| Buffer Overflow because the user is required to input 20 characters. |
|
|
Term
| What malicious software / malware typically takes screenshots of a system and hides them in a TEMP folder? |
|
Definition
|
|
Term
| What takes place when an attacker places malware in between an application and other files which intercepts the communications? |
|
Definition
|
|
Term
| What is taking place when someone receives a large number of messages on their Bluetooth device? |
|
Definition
|
|
Term
| What type of XSS attack sends users to a fake website? |
|
Definition
| A cross-site request forgery |
|
|
Term
| What takes place when a Bluetooth device has data stolen within close range? |
|
Definition
|
|
Term
| What are 4 methods of security for a workstation/laptop? |
|
Definition
a Host-based firewall, network sniffer, cable lock, and CAT5e STP
the network sniffer can help capture traffic for later analysis
Cat5e stp reduces risk of EMI |
|
|
Term
| _____ works with high-capacity storage where once the data is written it cannot be edited. this provides secure storage because backups cannot be tampered with |
|
Definition
| WORM (Write Once Read Many) |
|
|
Term
| What is the standard number of system wipes to completely get rid of data? |
|
Definition
|
|
Term
| for remote login and to execute cmd line functions what ports should be open or blocked? |
|
Definition
| Block 23 (telnet insecure) and open 22 (SSH) |
|
|
Term
| What is best for backup security and frequency? |
|
Definition
|
|
Term
| What tool finds vulnerabilities and attempts to exploit them? |
|
Definition
|
|
Term
| When you give a tester login info, you are allowing a what? |
|
Definition
|
|
Term
| What is the drawback to symmetric encryption |
|
Definition
| The key must be delivered in a secure manner because there is only one to encrypt and decrypt |
|
|
Term
| What can bypass security for 802.1x? |
|
Definition
|
|
Term
| Company Trade Secrets should be labeled as what? |
|
Definition
| Proprietary, because they're specific to the company and nothing else |
|
|
Term
| What is a non-legally binding agreement? |
|
Definition
|
|
Term
| What type of control is CAPTCHA? |
|
Definition
|
|
Term
| SLE is the ____ x the _____ |
|
Definition
| Product Value x the Exposure Factor (EF) |
|
|
Term
|
Definition
| Advanced Persistent Threat |
|
|
Term
| What type of attack could happen if a program has variables and doesn't check boundary values? |
|
Definition
|
|
Term
| What type of attack could hack passwords with dictionary words and numbers/symbols? |
|
Definition
| A hybrid attack that uses dictionary and brute force |
|
|
Term
|
Definition
| a network communication utility that's used to create connections between 2 machines. the presence of a netcat could indicate the machine's been compromised and has a possible backdoor |
|
|
Term
| in an IDS system, what is used to collect data from the network segment and forward that info to the analyzer? |
|
Definition
|
|
Term
| What is a drawback to Virtual IP load balancing? |
|
Definition
| it is connection-based, not load-based. it assumes all loads are similar. |
|
|
Term
| What type of attack can be attempted using a list of common passwords? |
|
Definition
|
|
Term
|
Definition
| Stateful Packet Inspection - Firewall |
|
|
Term
|
Definition
| Attribute based access control |
|
|
Term
| Why is event de-duplication important? |
|
Definition
| because the servers send data back to the SIEMS |
|
|
Term
| What type of server should be used prior to deploying applications to a live environment? |
|
Definition
| a Test Server that is identical to the production server |
|
|
Term
| If someone is concerned about authentication and permissions, what should be their first step? |
|
Definition
|
|
Term
| A configuration can be considered what in terms of contingency planning? |
|
Definition
| a Single point of failure |
|
|
Term
| What type of back is the quickest method to backup but also the slowest to perform? |
|
Definition
|
|
Term
| What should be used to avoid mishandling of items such as tapes, removal drives, cd's and dvds? |
|
Definition
|
|
Term
| What form describes how systems should be interfaced between 2 companies using shared systems? |
|
Definition
| an ISA - interconnection service agreement |
|
|
Term
| What method of EAP consists of three phases? |
|
Definition
in situations where a password policy cannot be enforced, EAP-FAST consists of three phases.
Provisioning, establishing a tunnel, and Authentication |
|
|
Term
| What form of EAP requires both server and client certificates? |
|
Definition
|
|
Term
| What would be the reason a MIM attacker wouldn't be able to decrypt messages that he intercepted? |
|
Definition
| Asymmetric Encryption - he doesn't have the decryption key |
|
|
Term
| Logic Bombs are still considered as a form of ____ |
|
Definition
|
|
Term
| What does a sparse infector virus do? |
|
Definition
| Performs activity sporadically |
|
|
Term
| The amount of data stolen is __ an attribute that would be considered after an attack |
|
Definition
|
|
Term
| A collision attack happens when what? |
|
Definition
| two different inputs produce the same hash |
|
|
Term
| A Smurf attack does what? |
|
Definition
| uses a fake ip address to get a subnet to reply and use up their resources |
|
|
Term
| A multipartite virus does what? |
|
Definition
| Combines infections with boot sector viruses |
|
|
Term
| For phishing emails, what would be the best security method to help mitigate them? |
|
Definition
|
|
Term
| If there are concerns with outside access to a wireless access point, what would be the best security method to implement? |
|
Definition
|
|
Term
| LT2P and Ipsec are both used with what? |
|
Definition
|
|
Term
| What does Heuristic Scanning do? |
|
Definition
| looks for anomalous behavior that may indicate an attack even if there's no signature for the attack itself |
|
|
Term
|
Definition
| a Proprietary communication technology and works with low-power devices and can spend long periods in sleep modes. |
|
|
Term
|
Definition
| the document for the International Security Standard |
|
|
Term
|
Definition
| International Cloud Security standards |
|
|
Term
| How are Rainbow-Table attacks mitigated? |
|
Definition
| with longer passwords. a Rainbow-table attack can easily crack passwords shorter than 14 characters. |
|
|
Term
| What would be the reason for rejecting authentication for ABAC while traveling? |
|
Definition
|
|
Term
|
Definition
| HMAC (keyed-hash message authentication code) one timed password |
|
|
Term
| true or false: NTLM was native default for Windows which eventually became Kerberos |
|
Definition
|
|
Term
|
Definition
| Database activity monitoring prevention |
|
|
Term
| What comes before containment in regards to discovering malware? |
|
Definition
|
|
Term
| T or F: an HR employee is considered a custodian security role |
|
Definition
|
|
Term
|
Definition
| Perfect Forward Secrecy - for VPN safety of session keys |
|
|
Term
| What must happen if a certificate is revoked? |
|
Definition
| A new key pair must be generated and get a new certificate |
|
|
Term
| What is one way to ensure file integrity on a system or device? |
|
Definition
|
|
Term
| What cryptography method uses two-mathematically related keys to secure data during transmission? |
|
Definition
|
|
Term
|
Definition
| also known as a playback attack. form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. |
|
|
Term
| What is an Amplification attack? |
|
Definition
| a DDOS attack that targets DNS resolvers to overwhelm them with traffic. |
|
|
Term
| What is a Pass the Hash attack |
|
Definition
| A remote attack that uses the underlying NTLM or LanMan hash of a users password instead of plaintext. |
|
|
Term
| what are the attributes of threat actors? |
|
Definition
Internal/external
level of sophistication
Resources/funding
intent/motivation |
|
|
Term
| What's the difference between RSA and Diffie-Hellman? |
|
Definition
RSA is a public-key encryption that uses multiplication of prime numbers.
Diffie-hellman is a exponential key exchange that uses a shared secret between two parties. and computes by exponents. |
|
|
Term
|
Definition
Key-hash message authentication code or hash-based
uses a key and hash function |
|
|
Term
T or F
Salted Hash Tables add a "salt" value to the end of a password and hashes that, so the hash value is always completely different |
|
Definition
|
|
Term
| What does a business continuity plan do? |
|
Definition
| it Identifies critical systems and components that need to be protected. |
|
|
Term
| If someone is concerned about account logins being compromised what should they implement? |
|
Definition
| SMS authentication for any logins from an unknown computer or location |
|
|
Term
|
Definition
Security Assertion Markup Language
-SCADA - systems all over the place
Single Sign On among web apps
login to multiple devices
|
|
|
Term
|
Definition
| NT Lan Manager - windows authentication method (2+ windows systems in a workgroup without a domain controller) - each side has a challenge message hashed and challenges each other (like a double chap between client and server) |
|
|
Term
| What is Kerberos used for? |
|
Definition
used to authenticate to windows domain controllers (key distribution center)
tcp\udp port 88
Authentication Service
Ticket Granting Ticket (SID) |
|
|
Term
SLA's define
MOU's define
ISA's define
BPA's define |
|
Definition
expectations of service provider
Mutual Agreements
Technical and security requirements
Legal agreements |
|
|
Term
When an attacker places malware between an application and other files intercept the communication (i.e a file has the same name and interface as a system DLL but handles input differently and apps attach to it instead of the dll)
What is this called? |
|
Definition
|
|
Term
A Stateful firewall blocks based on :
A stateless firewall blocks based on : |
|
Definition
Behavior more than rules
an Access control list, and defined rules |
|
|
Term
|
Definition
| Cloud Access Security Broker |
|
|
Term
Users receive training on :
Privileged Users receive training on:
Executive Users receive training on:
System Owners receive training on: |
|
Definition
General Awareness
how to handle network access
how to spot targeted attacks
how to manage particular systems |
|
|