Chap 3 - Implementation Flashcards
(193 cards)
Chap 3-1: Adam is setting up public key infrastructure (PKI) and knows that keeping the passphrases and encryption keys used to generate new keys is a critical part of how to ensure that the root certificate authority remains secure. Which of the following techniques is not a common solution to help prevent insider threats?
Require a new passphrase every time the certificate is used
Use a split knowledge process for the password or key
Require dual control
Implement separation of duties
Require dual control
Chap 3-3: Chris is preparing to implement an 802.1X-enabled wireless infrastructure. he nows that he wants to use an Exrtensivble Authentication Protocol (EAP)-based protocol that does not require client-side certificates. Which of the following options should he choose?
EAP-MD5
PEAP
LEAP
EAP-TLS
PEAP
PEAP
Protected Extensible Authentication Protocol, relies on server side certificates and relies on tunneling to ensure communications security
Supports TLS
LEAP
Lightweight Extensible Authentication Protocol. uses WEP keys for encryption and is not recommended.
Does not support TLS
EAP-TLS
Extensible Authentication Protocol Transport Layer Security; requires certificates on both client and server side, this increasing overhead (aka mutual authentication)
EAP-MD5
Not recommended for wireless networks, does not support mutual authentication of wireless client and network
Chap 3-4: What term is commonly used to describe lateral traffic movement within a network?
Side-stepping
Slider traffic
East-West traffic
Peer interconnect
East-West traffic
East-West traffic
Used to describe lateral traffic movement within a network
Chap 3-5: Charlene wants to use security features built into HTTP headers. Which of the following is not an HTTP header security option?
Requiring transport security
Preventing cross site scripting
Disabling SQL injection
Helping prevent MIME sniffing
Disabling SQL injection
MIME
Multipurpose Internet Mail Extensions
MIME sniffing can be used in XSS attacks
Also has a secure version in S/MIME
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs. Message bodies may consist of multiple parts, and header information may be specified in non-ASCII character sets. Email messages with MIME formatting are typically transmitted with standard protocols, such as the Simple Mail Transfer Protocol (SMTP), the Post Office Protocol (POP), and the Internet Message Access Protocol (IMAP).
Chap 3-9: Chalres has been asked to implement DNSSEC for his organization. Which of the following does it provide?
Confidentiality
Integrity
Availability
All of the Above
Integrity
DNSSEC
Domain Name Systems Security Extensions
provides authentication of DNS data allowing DNS queries to be validated even if they are not encrypted; thus ensuring integrity of the CIA triad
Chap 3-12: Casey is considering implementing password key devices for her organization. She wants to use a broadly adopted open standard for authentication and needs her keys to support that. Which of the following standards should she look for her keys to implement, in addition to being able to connect via USB, Bluetooth and NFC?
SAML
FIDO
ARF
OpenID
FIDO
FIDO
FIDO U2F is an open standard provided by the Fast IDentity Online Alliance used for security keys
Chap 3-13: Nadia is concerned about the content of her emails to her friend Danielle being read as they move between servers. What technology can she use to encrypt her emails, and whose key should she use to encrypt the message?
S/MIME, her private key
Secure POP3, her public key
S/MIME, Danielle’s public key
Secure POP3, Danielle’s private key
S/MIME, Danielle’s public key
Chap 3-14: What type of communications is SRTP most likely used for?
Email
VoIP
Web
File Transfer
VoIP
SRTP
Secure Real Time Transfer Protocol, used in VoIP communications
FTP Port
TCP 21
FTPS Port
TCP 990 (default)
SFTP Port
SFTP is FTP over SSH, so it uses TCP port 22
Chap 3-15: Olivia is implementing a load balanced web application cluster. Her organization already has a redundant pair of load balancers, but each unit is not rated to handle the maximum designed throughput of the cluster by itself. Olivia has recommended that the load balancers be implemented in an active/active design. What concern should she raise as part of this recommendation?
The load balancer cluster cannot be patched without a service outage
The load balancer cluster is vulnerable to a denial of service attack
If one of the load balancers fails, it could lead to service degradation
None of the above
If one of the load balancers fails, it could lead to service degradation
a failure in one of the active nodes would result in less maximum throughput and a potential for service degradation
What occurs when a certificate is stapled?
Both the certificate and the OCSP responder are sent together to prevent additional retrievals during certificate path validation
The certificate is stored in a secured location that prevents the certificate from being easily removed or modified
Both the host certificate and the root certificate authority’s private key are attached to validate the authenticity of the chain
The certificate is attached to the other certificates to demonstrate the entire certificate chain
Both the certificate and the OCSP responder are sent together to prevent additional retrievals during certificate path validation
Certificate Stapling
Certificate Stapling: also called OCSP stapling - formally known as the TLS Certificate Status Request extension, is a standard for checking the revocation status of X.509 digital certificates.
It allows the presenter of a certificate to bear the resource cost involved in providing Online Certificate Status Protocol (OCSP) responses by appending (“stapling”) a time-stamped OCSP response signed by the CA to the initial TLS handshake, eliminating the need for clients to contact the CA, with the aim of improving both security and performance.
OCSP
Online Certificate Status Protocol : An alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked.