Domain 1 and Test Sudy 1 Flashcards

1
Q

What are the three levels/types of authentication?

A

Type 1 - Something you know
Type 2 - Something you have
Type 3 - Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What contract is based upon connecting disparate business networks together?

A

ISA

Interconnect service agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which authentication protocol is deprecated because of vulnerabilities?

A

LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Defined step in CMMI?

A

Processes characterized for the organization and is proactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What part of an SDN is responsible for the routing of data?

A

Control plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part of an SDN determines how to handle incoming packets?

A

Data plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When discussing platforms, what is SoC?

A

System on a chip, a sophisticated, embedded system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some regulatory standards?

A

GDPR, HIPAA, GLBA, SOX, PIPEDA, COPPA, FISMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two advantages of high level programming languages?

A

Human readable syntax and it is easier to enforce coding standards because there is a specific order to that syntax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is PEAP?

A

A Microsoft favored package protected by TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe trademark

A

Trademark is the exclusive right to use symbols, words, colors, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In contracts what is an OLA?

A

Operating level agreement. This defines the interdependent relationships in support of an SLA. Describes the responsibilities of each support group towards other support groups, and includes timeframes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What CMMI level focuses on continuous process improvement?

A

Optimizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What attack allowed Linux OS command injection?

A

Shellshock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Initial in CMMI?

A

Processes are inconsistent, not organized, reactive, poorly managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the common tenets of privacy law?

A
NPSLARSD 
Notification
Participation
Scope
Limitation
Accuracy
Retention
Security
Dissemniation
or DRSSLAPN
Dissemination
Retention
Scope
Security
Limitation
Accuracy
Participation
Notificiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is SASL?

A

Simple authentication and securtiy layer, a directory access protocol that can implement a wide variety of authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which authentication protocol uses a secure tunnel but does not distribute certificates?

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are four industry standards?

A

ISO, CSA Star, Uptime Institute, SSAE 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are STRIDE, VAST, OCTAVE, and Trike?

A

Threat modeling techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are three main tenets of Clark-Wilson?

A

Prevent unauthorized users form making changes, prevent authorized users from making improper changes, and maintaining consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Optimizing in CMMI?

A

Focus on continuous process improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What CMMI level are processes characterized for the organization and is proactive?

A

Defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What CMMI level are processes measured and controlled?

A

Quantitatively managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is MAD

A

Maximum allowable downtime - the maximum time until the business is non viable. Also known as MTD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an XML based protocol that can provision services and user accounts?

A

SPML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is unit testing?

A

A method by which small, individual units and components are verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the difference between US Code and Code of Regulations?

A

Code of regulations is administrative law, where US Code are laws enacted by congress. Code of regulations are based on US Code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which directory access can implement a wide variety of authentication methods?

A

SASL

Simple authentication and security layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What CMMI level is inconsistent processes, not organized, reactive, and poorly managed?

A

Initial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a fuzzing tool that offers both dumb and intelligent techniques?

A

Peach Fuzzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is EAP-FAST?

A

LEAP successor using a protected tunnel by Cisco.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Heartbleed?

A

An attack on OpenSSL that allows for the reading of memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is scoping in risk management?

A

Selecting controls that are applicable to a given asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is an embedded system that is quite sophisticated?

A

SoC or System on a Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the difference in cohesion and coupling?

A

Cohesion refers to methods that are similar and belong together. Coupling refers to the degree to which methods are dependent on other methods or modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In contracts, what is an MSA?

A

Master services agreement. An agreement that will govern future transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which IP protection is best for a new logo?

A

Trademark

39
Q

What is a CPU level vulnerability that let an application read outside of its protected area?

A

Meltdown

40
Q

What is an attack against SSLv3 that allows an attacker to decrypt traffic in flight?

A

POODLE

41
Q

Which biometric type is not considered very accurate, regardless of health?

A

Hand Geometry

42
Q

What is assessing in risk management?

A

Verifying that controls are functional.

43
Q

What CMMI level are processes focused on basic project management and reactive?

A

Managed or Repeatable

44
Q

What is CPE?

A

Common platform enumeration.

45
Q

What type of contract deals with future transactions?

A

MSA

Master services agreement

46
Q

Which IP protection is best for a new idea?

A

Patent

47
Q

What is the P12 certificate format?

A

PKCS 12 or P12 can contain both public and private keys as a single, encrypted file.

48
Q

What is something may exploit a vulnerability and creates risk?

A

A threat.

49
Q

Which IP protection is best for creative works?

A

Copyright

50
Q

In contracts, what is an ISA?

A

Interconnection services agreement. A business contract between organizations for the purpose of interconnecting their networks.

51
Q

What describes timeframe for delivery of services among support groups?

A

OLA

Operating level agreement.

52
Q

What is EAP-TTLS?

A

EAP Tunnled TLS, doesn’t require signed certificates.

53
Q

What is the CMMI?

A

Capability Maturity Model Integration

54
Q

What is EAP-TLS?

A

EAP for requiring client side certificates and assumes users will reject untrusted certificates.

55
Q

What are the parts of an SDN?

A

Control plane and data plane. Control plane relates to the networking components responsible for routing of data, data plane is the component that determines how to forward or process inbound packets.

56
Q

What is NIST 800-137

A

Continuous Security Monitoring

57
Q

What are the two CISCO created authentication protocols?

A

LEAP, EAP-FAST

58
Q

What is Meltdown?

A

A CPU level vulnerability that allowed one application to read outside of its protected area to others.

59
Q

What is SPML?

A

Services provision markup langauge, an XML based protocol capable of provisioning services.

60
Q

What network type is defined via code instead of hardware?

A

SDN

Software defined network.

61
Q

In contracts what is an MOU?

A

A nonbinding agreement between two or several parties that expresses a common line of action but does not imply a legal commitment, a form of a gentleman’s agreement.

62
Q

What is a certificate format to store both public and private keys as a single file?

A

PKCS 12 or P12

63
Q

What is a Microsoft favored credential package that is protected by TLS?

A

PEAP

64
Q

What is Managed or Repeatable in CMMI?

A

Processes are focused on basic project management and still reactive.

65
Q

What is adherence to a mandate?

A

Compliance

66
Q

What is an attack that allows for the reading of memory?

A

Heartbleed

67
Q

What is ShellShock?

A

A Linux attack that would allow OS command injection?

68
Q

What is an area of storage not fully used by a file?

A

Cluster tip

69
Q

What is Categorizing in risk management?

A

Describing, examining, and identifying a system. It is also assining a security role.

70
Q

Which authentication protocol uses certificate exchanges to secure credentials?

A

EAP-TLS

71
Q

Describe patents.

A

Patents protect new, original ideas or inventions.

72
Q

What is a vulnerability?

A

Something that could be exploited

73
Q

What type of contract is nonbinding and expresses a common line of action between two or more groups?

A

MOU

Memorandum of understanding

74
Q

What is the smallest possible part of software testing?

A

Unit testing

75
Q

What are the parts of STRIDE, and who made it?

A
Microsoft made it, 
Spoofing identity
Tampering with data
Repudiation
Information Disclosure
DOS
Elevation of privelege
76
Q

Which authentication protocol encapsulates credentials inside a TLS envelope?

A

PEAP

77
Q

What is SLA and what does it mean?

A

Service Level Agreement

Defines the minimum requirements.

78
Q

What is Tailoring in risk management?

A

Customizing selected controls to meet specific needs.

79
Q

What is an SDN?

A

Software defined Network - network connections are defined through code.

80
Q

What is the term for acting on a vulnerability?

A

Exploit

81
Q

What is the POODLE attack?

A

An attack against SSLv3 decrypting traffic in flight.

82
Q

What is VAST?

A

Visual agile and simple threat modeling that promotes its use across the entire infrastructure.

83
Q

What is the term for how an organization is managed?

A

Governance

84
Q

What is a standards based system and software inventory system?

A

CPE

85
Q

What is a cluster tip?

A

An area not fully utilized by a file, often used for stegonography

86
Q

In contracts, what is an MOA?

A

Memorandum of agreement, describes a cooperative relationship to work on a project together.

87
Q

What are the traits that DRM should have?

A
ICPDA
Interoperability
Continous audit trail
Persistency
Dynamic Policy Control
Automatic Expiration
88
Q

What is Quantitatively Managed in CMMI?

A

Processes are measured and controlled.

89
Q

What is LEAP

A

Cisco made authentication protocol, it is deprecated because of vulnerabilities.

90
Q

What is Selecting in risk management?

A

Identifying controls that apply to your assets.

91
Q

Describe copyright.

A

Copyright protects the representation of ideas, creative works.

92
Q

What type of contract deals with cooperatively working on a project?

A

MOA

Memorandum of understanding.

93
Q

What is the NIST standard for continuous monitoring?

A

NIST 800-137