Bucket List 2 Flashcards

1
Q

What are the four cloud architecture types?

A

Private, Public, Community, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.1P

A

qos/priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps to the penetration testing methodology?

A

Plan, Discover, Attack, Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is quality control?

A

The focus is on the quality of the product after it has been created, it is reactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In forensics, what is the order of volatility mean?

A

Capture most volatile, short term memory first?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which layer is TCP/UDP at?

A

Layer 4, Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What filters network traffic?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer is best for encryption, https?

A

Layer 7, Applcation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between HMAC and a Digital Signature?

A

HMAC - both parties need the same key, Digial Sig is public/private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of cloud offerings?

A
PaaS
IaaS
NaaS
SaaS
IDaaS
SecaaS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of cloud?

A
BRROMM - 
Broad network access
Rapid elasticity
Resource pooling
On demand self service
Measured service
Multi-tenancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security model is focused on creation, ownership, and the 8 basic rights?

A

Graham-Denning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is quality assurance?

A

The big picture of process involving quality, it is proactive.
Ensure the process of making a product has high quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which security model is write up / read down?

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does does Radius authentication make use of?

A

Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer contains hubs?

A

Layer 1, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a smurf attack?

A

Directed broadcast using PING / ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer contains IP

A

Layer 3, Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the steps to incident management?

A
DR MRRRL
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Kerkhoff’s Principle?

A

That any cryptographic system should be secure if every part of it is public except for the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which part of CIA is threatened by DDOS or ransomware?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three keys of biometric accuracy?

A

Type 1 - FRR - False Rejection Rate
Type 2 - FAR - False Acceptance Rate
CER - Crossover Error Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the A in ACID and what does it mean?

A

Atomicity - that a transaction must fully complete or not go through at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the least effective type of media sanitation?

A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which access control is based on rules?

A

RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which security model focuses on subject-program-rights?

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which access control is the least strict?

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What helps achieve the A in CIA

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which part of CIA is threatened by unintended data change?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What access control is based upon tags on records?

A

ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Linus’ law?

A

Sufficient eyeballs looking at code will make all bugs become apparent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which is proactive, QA or QC?

A

QA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are four types of VPN?

A

IPSec, L2TP, PPTP, HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which security model is focused on constraining data?

A

Clark-Wilson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which IP version contains Anycast?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which layer contains bits?

A

Layer 1, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a documented method of media destruction?

A

Defensible destruction

38
Q

What is an HMAC?

A

Hashed Message Authentication Code, it provides authentication and integrity, it is fast, both parties need a key.

39
Q

Which layer contains switches?

A

Layer 2, Data link

40
Q

What are the layers of the OSI model?

A
Physical
Data
Network
Transport
Session
Presentation
Application
41
Q

What type of media sanitation removes data without hope of recovery, but the media remains usable?

A

Purging

42
Q

What type of controls do Firewalls vs Routers impose?

A

Firewall - rules, Router - ACLs

43
Q

What’s the best way to protect applications?

A

WAF / Application Proxy

44
Q

List memory in the order of volatility.

A
Cache Level 1
Cache Level 2
RAM
SSD / USB
HDD
TAPE
45
Q

Which is a EU version of an authentication server?

A

Diameter

46
Q

Which access control is the most strict?

A

MAC

47
Q

Which part of CIA is threatened by information leakage, sniffing, or protocol analysis?

A

Confidentiality

48
Q

What is 802.3

A

ethernet

49
Q

Which layer contains routers?

A

Layer 3 , Network

50
Q

What helps achieve the I in CIA

A

Hashing

51
Q

Which is the most accurate biometric?

A

Iris

52
Q

What is 802.1Q

A

VLANs

53
Q

Which layer contains VLANS?

A

Layer 2, Data Link

54
Q

What are 4 authentication servers

A

Kerberos, Radius, Diameter, TACACS

55
Q

What are the characteristics of IPv6?

A

Unicast, Multicast, Anycast, 128 bit address, ipsec on by default

56
Q

What are the characteristics of IPv4?

A

Unicast, Multicast, Broadcast, 32 bit address

57
Q

What form of authentication does Kerberos use?

A

Tickets

58
Q

Which authentication server is best?

A

Kerberos

59
Q

What form of authentication does TACACS use?

A

Acces list, ACL

60
Q

Which layer contains packets?

A

Layer 3, Network

61
Q

What is the port security standard?

A

802.1x

62
Q

What function of IPv4 is stopped by routers?

A

Broadcast

63
Q

How many bits is IPv4 and IPv6?

A

32 and 128

64
Q

Which security model is read up / write down?

A

Biba

65
Q

What is the difference in verification and validation?

A

Verification means that it meets specifications. Validation means that the specifications are correct.

66
Q

Which security model is based on object, subject, and rights?

A

Grahm-Denning

67
Q

What are three types of media sanitization?

A

Overwrite, degauss, encryption

68
Q

What is the QOS / priority protocol?

A

802.1P

69
Q

What are some outdated routing protocols?

A

RIP, RIPv2

70
Q

Which is reactive, QA or QC?

A

QC

71
Q

What is the spanning tree protocol standasrd?

A

802.1D

72
Q

Which layer contains segments?

A

Layer 4, Transport

73
Q

What is the vlan protocol?

A

802.1Q

74
Q

Which security model requires transactions to be signed off by a third party?

A

Clark-Wilson

75
Q

What are the types of fire extinguishers?

A
ACBDK
Ash - paper
Current - electric
Boiling - flammable liquid
Dynamite - explosive
Kitchen - grease
76
Q

What are the requirements for forensic evidence have?

A

COAA - Comprehensive, Objective, Accurate, Admissible

77
Q

What is 802.1D

A

spanning tree / loops

78
Q

Which access control is based on roles?

A

RBAC

79
Q

What is defensible destruction?

A

Documented proof that you’ve destroyed something.

80
Q

What does ACID mean?

A

Atomicity
Consistency
Integrity
Durability

81
Q

Which authentication service involves tickets?

A

Kerberos

82
Q

Which authentication service involves certificates?

A

Radius

83
Q

What is the ethernet protocol?

A

802.3

84
Q

What are Cisco specific routing protocols?

A

IGRP, EIGRP

85
Q

What are the current routing protocols?

A

BGP, OSPF

86
Q

Which layer contains frames?

A

Layer 2, Data Link

87
Q

What is 802.1x

A

Port security

88
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

89
Q

What helps achieve the C in CIA

A

Encryption

90
Q

Which security model helps prevent conflict of interest?

A

Brewer-Nash

91
Q

Which security model is based on preventing a subject from seeing certain objects?

A

HRU, Harrison, Ruzzo, Ullman