Additional Info Flashcards

1
Q

Port 20 and 21

A

FTP, File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

22

A

ssh, secure shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

23

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

25

A

SMTP, Simple Mail Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

53

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

69

A

TFTP, Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

80

A

HTTP, HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

110

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

124

A

NTP, Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

143

A

IMAP, Internet Message Access Protocol (version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

161

A

SNMP, Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3389

A

RDP, Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RC-4, AES, 3DES are examples of what type of Cryptography? Symmetric or Asymmetric

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC-4 is a certain type of Symmetric Cryptography. What type?

A

Stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption algorithm is the default standard for most applications?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of hashing a message, encrypting the hash with the senders private key, the receiver decrypting it with the sender’s public key and then hashing the message to make sure the hashes match is called what?

A

A digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Formula to determine the amount of keys needed for Asymmetric crypto

A

2N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Formula to determine the amount of keys needed for Symmetric crypto

A

(N*(N-1))/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Six common Asymmetric algorithms that might be on the test. (Everything else is Symmetric)

A

DSA, RSA, ECC (Eliptical Curve) EL Gamal, Diffie Hellman, Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MD-5 Hashing Algorithm length

A

128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA-1 Hashing Algorithm length

A

160 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SHA-256 Hashing Algorithm length

A

256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A digital signature gives you integrity and authentication which equals non repudiation. What does it not give you?

A

Privacy of the message is not protected by a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Digital Certs follow which standard

A

X.509 v.4 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Two ways to check and see if a certificate has been revoked

A

CRL or OCSP (Online Certificate Status Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

government standard hash functions developed by the National Institute of Standards and Technology (NIST) and specif ed in an official governmentpublication—the Secure Hash Standard (SHS), also known as Federal Information Processing Standard (FIPS) 180

A

SHA-1 and SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name the four variants of SHA-2

A

SHA-256, SHA-512, SHA-224, SHA-384

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What part of IPSec provides integrity, authenticity and non repudiation

A

AH (Authentication Header) through the use of an ICV (Integrity Check Value)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What part of IPSec provides Confidentiality

A

ESP (Encapsulating Security Payload). If you need confidentiality then you must use ESP.

30
Q

IPSec on it’s own does not provide security. It only provides encapsulation. What sub protocols of IPSec provide the security?

A

AH (Authentication Header), ESP (Encapsulating Security Payload) and IKE (Internet Key Exchange)

31
Q

ISO 15408 uses protection profiles and security targets. It is also commonly called what?

A

Common Criteria

32
Q

In the Block Cipher method called _______, the relationship between the plaintext and key are so complicated that the attacker can’t alter the plaintext in an attempt to determine the key used to encrypt the plaintext.

A

Confusion

33
Q

This occurs when a change in the plain text results in multiple changes spread throughout the ciphertext.

A

Diffusion

34
Q

MTBF

A

Mean Time Between Failure

35
Q

MTTR

A

Mean Time To Recover

36
Q

MTD

A

Max Tolerable Downtime

37
Q

RPO

A

Recovery Point Objective - How current should data be

38
Q

Least privilege is about rights and what you can do. Need to know is about data and knowledge.

A

Least privilege is you don’t get to change date and time on a system. Need to know is you don’t get to access finance data with finance info.

39
Q

Likelihood that a threat will exploit a vulnerability

A

Risk

40
Q

This has the potential to harm an asset

A

Threat

41
Q

A weakness or lack of a safeguard

A

Vulnerability

42
Q

An instance of a compromise

A

Exploit

43
Q

In DBMS this refers to transactions being all or nothing.

A

Atomicity

44
Q

In DBMS this property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including but not limited to constraints, cascades, triggers, and any combination thereof.

A

Consistency

45
Q

In DBMS this property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other. This is the main goal of concurrency control.

A

Isolation

46
Q

Name the 3 main Risk Assessment methodologies.

A

OCTAVE, FRAP and NIST 800-30

47
Q

Risk management Guide for Information Technology Systems

A

NIST 800-30

48
Q

The four main concepts of the Risk Management Process

A

Risk Assessment, Risk Analysis, Risk Mitigation and Manage Risk

49
Q

COBIT, COSO, ITIL and ISO 27000 Series are all examples of what?

A

Security Governance Frameworks

50
Q

COBIT and COSO both focus on goals for security

A

If we see anything related to IT security goals then they are talking about COBIT or COSO

51
Q

For ITIL need to remember ‘IT Service Management’

A

IT Service Management = ITIL

52
Q

For OCTAVE remember Self directed risk evaluation

A

Self directed = OCTAVE

53
Q

This security governance framework describes how Establishment Implementation, Control and improvement of the ISMS (information security management system)

A

ISO 27001

54
Q

This security governance framework provides practical advice for how to implement security controls. It uses 10 domains to address ISMS.

A

ISO 27002

55
Q

What is the purpose of Knowledge Transfer and/or User Training

A

To modify employee behavior. That is the ultimate goal. To raise security awareness could also be an option.

56
Q

The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.

A

ISC2 Code of Ethics Preamble

57
Q

ISC2 Code of Ethics Canons

A

Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly, responsibly, and legally.
Provide diligent and competent service to principles.
Advance and protect the profession.

58
Q

What is the length of a copyright?

A

the lifetime of the author plus 70 years for individuals. 75 years from the start of copyright for corporations.

59
Q

Patent are for inventors. What are the length of patents?

A

20 years from cradle to grave (idea starts the 20 year time)

60
Q

What is the main international organization run by the UN that deals with Intellectual property

A

WIPO (World Intellectual Property Organization)

61
Q

Which Export law restricts exporting cryptographic software?

A

WASSENAAR Agreement

62
Q

What 3 entities does HIPAA apply to?

A

Health Insurers, Health Providers and Health care clearing houses (claim processing agencies)

63
Q

This specific law requires financial agencies to better protect customer’s PII

A

GLBA (Gramm-Leach-Bliley)

64
Q

Name the four phases of Business Continuity planning

A

Project scope and planning
Business impact assessment
continuity planning
Approval and implementation

65
Q

The following activities happen during which phase of the BCP: obtain senior management’s support, secure funding and resource allocation and select members of the bcp team

A

Project scope and planning

66
Q

Name the 5 types of tests that can be performed in BCP.

A

Checklist test, Structured Walk-Through Test, Simulation Test, Parallel Test, and Full-Interruption Test

67
Q

What phase of the BCP do we indentify and prioritize all business functions based on criticality. During this phase we create quantitative and qualitative values to address the impact on the organization.

A

Business impact assessment or analysis

68
Q

Recovery Point objective vs Recovery Time Objective

A

Recovery point refers to data; recover data to a certain point in time. Recovery time refers to recovering hardware or software; how long will it take to rebuild a server.

69
Q

T or F? When a BCP plan is updated original copies are retrieved and destroyed

A

True

70
Q

IP header protocol field 6

A

TCP

71
Q

IP header protocol field 1

A

ICMP

72
Q

IP header protocol field 17

A

UDP