CEHv10 Flashcards
What is preventative control?
Controls in place to prevent something from occurring. A smart card could be preventative meassure
What is Corrective control
An attempt to correct an issue. Like antivirus attempting to remove malware.
What is Registration Authority
The registration authority (RA) is the entity responsible for receiving certificate request, identifying the subject and requesting the CA to issue a certificate.
what is the OCSP?
Online Certificate Status Protocol. Obtains revocation status of X.509 certificates
What does the Verification Authority (VA) do?
Validates the identity of a subject when a certificate is used.
What does a CA Certificate Authority do?
Issues certificates based on requests from the RA
What does SOAP do?
Simple Object Access Protocol. Is platform independent, simplifies communication and leverages multiple transport protocols.
Not faster then CORBA because it utilizes XML which takes longer then binary.
What is CORBA?
Common Object Request Broker Architect. A standard defined by the object management group (OMG). Designed to facilitate the communication of systems that are deployed on diverse platforms
What is IPChains
A firewall on older linux kernels up to verion 2.2x
Has the ability to filter packet fragments.
What is IPTables
A linux firewall that replaced IPChains from Linux kernel version 2.4x and above
What is ipfwadm?
An older linux firewall replaced by IPChains.
What are the 3 types of the Web Application Architecture
- Client or presentation layer - The frontend of the application.
- Business logic layer - Controls how the application works.
- Database Layer - Handles and stores data required by the application.
What is een alternate data stream
Hiding data in existing files
True statements regarding whitfiled diffie and martin hellman.
- The algo named after them performs encryption
2. They invented Public Key Encryption
What is the NMAP TCP Connect scan?
Peforms a full tcp connection or completes the full tcp handshake. It is very easy to detect on the hosts being scanned.
what can a network vulnerability scanner not do?
Scan through a firewall.
What are the 8 steps of a CEH scanning methodology
- check for live systems
- check for open ports
- check beyond the IDS
- Grab banners
- Scan for vulnerabilities
- Draw network diagrams
- prepare proxies
- Pen test the network for scanning vulnerabilities.
Describe an N-Tier architecture
Each server performs a single and unique role in the group. Web-server, database server and application server.
Describe service-oriented architecture (SOA)
The components provide a service to other components via a communication protocol.
What is seperation of duties
A security concepts that prescribes breaking operatino int parts and assign the parts to individuals to prevent fraud.
What is Dual control
I requeres 2 individuals to be present to perform a sensitive operation. Like missile launch.
What is OWASP
Testing methodologies to address security controls
What is OWASP top 10 proactive controls?
- verify security early and often
- parameterize queries
- encode data.
- validate inputs.
- implement identity and authentication controls
- implement appropriate access controls
- protect data
- implement logging and intrusion detection
- leverage security frameworks and libraries
- implement error and exception handling
What is NIST
National Institute of Standards and Technology. valt onder de amerikaanse overheid en zet zich in voor standaardisatie in de wetenschap.