CompSecFinal Flashcards

(60 cards)

1
Q

Magnetic tapes came to the forefront as a storage medium during this “chilly” period in American history.

A

Cold War Era

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The governmental agency that became the backbone of the internet.

A

ARPA/DARPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This Navy read admiral was credited with finding the first computer ‘bug’ as well as developing the first interpreter so people could develop software in a more native language rather than machine code.

A

Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This was one of the first fully electric and reprogrammable computers developed at the university of Pennsylvania to calculate military ballistic trajectories.

A

ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the two main figures that worked at Bletchley Park during WWII to decrypt the enigma and Lorenz Electro-Mechanical Rotor Cipher Machines.

A

Alan Turing and Gordon Welchman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These type of keys can be used to defeat door locks with a ‘whack’.

A

Bump keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This two door entry system tries to prevent ‘piggybacking’.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Putting razorwire on top of your 10 foot high fence would shift your security posture from deterrent to this other more severe option.

A

Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These security cameras no longer harken to their namesake as they are often put on the general network where they can be exposed to hacking.

A

Close circuit television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

We learned that proper disposal of paperwork as well as old storage media is important to thwart this attack vector.

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The concept where you should give users only the permissions they need.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A vulnerability for which there currently is no patch

A

Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When someone changes position with an organization but their access from their previous position is not revoked … even though they no longer need it.

A

Creeping privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious organization, often backed by government funding, that specializes on delving deep into your network and maintaining persistent access to perpetrate exfiltration and more heinous attacks.

A

Advanced persistent threats (APTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hiding secret messages inside of other file types; such as images

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is the 3-letter core ‘shape’ of information security

A

C.I.A. Triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is what the AAA of infosec stands for.

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

There are 3 group policies in this category that are instrumental in thwarting brute-force attacks.

A

Account-lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bob, from accounting, perpetrating an SQL injection attack against the corporate database via a web accessible frontend would be this type of entity in a threat landscape; not something as specific as a hacker but more specific than just a general threat.

A

Threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The 3 something you ____’s that go into multifactor authentication

A

1] something you know
2] something you are
3] something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A hash this type of directional function; cannot be reversed

A

One-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This term refers to a small change in the input text resulting in a large change in the hashed value.

A

High amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is probably the most popular hashing algorithm to date and comes in varieties of 1, 2, and 3 while 3 still has not had wide implementation

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These are pre-hashed passwords that can help speedup password attacks by already having done the computational intensive calculations for common passwords

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
This hash algorithm only has a 128 bit digest and is no longer considered secure as it has been shown to suffer from 'collisions'
MD-5
25
Connection oriented protocol that is good for file transfers
TCP
26
This is a plan that larger organizations should maintain which details how they will continue to operate in a disaster situation
Business continuity plan
27
You don't want to just go around giving this NTFS permission to everyone as it would allow them to change permissions on items themselves
Full control
28
The three letters used to refer to the 3 main permission types for files and folders
R, W, X
29
Password strength is made up of these two items
Length and complexity
30
The type of access control that windows NTFS permissions use; the creator / owner is able to assign access
Discretionary Access Control (DAC)
31
This is when an organization assigns access rights absed on the position one holds within the company
Role based access control (RBAC)
32
This was the access control that I said the government often uses with labels like 'secret' and 'top secret'
Mandatory Access Control (MAC)
33
This access control method may use things like geolocation to determine whether or not you can access an item
Attribute Based Access Control (ABAC)
34
A firewall uses this form of access control through ACLS
Rule Base Access Control (RBAC)
35
When performing a risk assessment, you would want to do this step first; setting how broad the assessment will be
Scope
36
The biggest threat to any organization is its own what?
Employees
37
In order to identify and analyze risks, one must know these two things that general Sun Tzu Wu emphasized in his book 'The Art of War'
1] Know yourself 2] Know your enemy
38
These are rules that an organization may have to follow based on the industry they are in
Compliance
39
Give me two of the three questions you should ask yourself in the evaluate / prioritize phase of a risk assessment
1] what threats have you faced in the past? 2] what risks are you willing to take? 3] what risks can youa afford protections for?
40
Cryptographic algorithms that use the same key to encrypt and decrypt are said to be this type of encryption
Symmetric
41
This type of server verifies SSL certificates for websites ... among other things
Certificate Authority (CA)
42
When you enter your username when logging into a computer, you are performing this first step of the login process
Identification
43
This is not a 'permission' as it is an action that you are granted the ability to carry out on a system
Right
44
This is one of the most widely used asymmetric encryption algorithms developed way back in 1977 but still used today; involves computations with large prime numbers
RSA
45
'Fishy' encryption algorithm that sounds like it was taken from a Dr. Suess book
Twofish
46
This type of symmetric key encryption transposes plaintext to ciphertext one bit at a time and is often implemented in hardware
Stream
47
The first federally backed encryption algorithm adopted for non-classified data and developed by IBM
DES
48
Current symmetric algorithm that offers 128, 192, and 256 bit keys
AES
49
Asymmetric encryption algorithm that achieves greater protection with a smaller key (defying logic) by using a special type of curve
Elliptic curve
50
This type of camera is generally more vandal resistant and can also hide where exactly it is pointing
Dome
51
A receptionist is this general type of security 'barrier' for security
Deterrent
52
This rating tells you how much light is needed for a security camera to capture a good image
LUX
53
Name two 'biological' entities (aside from humans) that we mentioned can be used for physical security?
1] guard dogs 2] trees [plants]
54
Name 2 benefits of using card (proximity or swipe) to secure doors over physical keys
1] easily revoked if lost or stolen 2] create a log of people entering and/or exiting
55
This type of 'interview' is one that should be held when someone is leaving your organization
Exit interview
56
This is how you must transfer a private key...
Out of band
57
This type of authentication attack just steals the 'token' you are granted by active directory and uses that to gain access; no need to know your password
Pass the hash
58
New form of authentication that utilizes public/private keys and never really exchanges anything (like a password) with the server you are logging into; you just unlock your device and have access
Passkeys
59