Domain 2: Access Control Flashcards

1
Q

What does “Subject” mean in the Access Control context?

A

An active entity on an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does “Object”mean in the access control context?

A

A passive data file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Discretionary Access Control (DAC)?

A

An access control method that gives subjects full control of objects they have been given access to including sharing the objects with other subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Mandatory Access Control (MAC)?

A

It is a method where the system enforces access control based on subject’s clearances and object labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Role Based Access Control (RBAC)

A

A type of non-discretionary access control where subjects are given roles and access is granted to roles and not the individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DAC stand for in the Access Control context?

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MAC stand for in the access control context?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does RBAC stand for in the Access Control context?

A

Roles Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Access Control?

A

To protect the Confidentiality, Integrity, and Availability (CIA) of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does CIA stand for in the Access Control context?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name two access control concerns.

A

Concern 1: Is the system flexible enough to allow users to run a wide variety of software that is not centrally controlled?

Concern 2: How to manage access control when legacy systems are running mission critical applications?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three elements to the Access Control Triad?

A

Involves implementing three strong measures:

1: technical
2: physical
3: Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three CIA Characteristics in the access control context.

A

1: All three work together to provide access control.
2: No one of the three is more important than the other two.
3: Every IT system will require a different prioritization of the three depending on the data, the user community and the required timeliness for data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Draw the CIA Pyramid

A

Confidentiality -> Disclosure

Integrity - Alteration

Availability - Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does DAD stand for in the Access Control context?

A

Disclosure

Alteration

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name three examples of Disclosure from DAD.

A

1: Unauthorized access to the system
2: The unencrypted transmission of data across an insecure network
3: A trusted user relaying information to an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name two kinds of Alteration (DAD)

A

1: Accidental Alteration of data.
2: Purposeful Alteration of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name on example of Destruction (DAD)

A

The North Korean scorched earth attack against South Korea.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does IAAA stand for in the access control context?

A

Identification and Authentication

Authorization

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Identification mean in the IAAA context?

A

Identification: A claim by a subject to be somebody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name two characteristics of Indentification in the IAAA contex.

A

1: Must be unique or they cannot be accountable
2: Ideally, user names should not be descriptive: x3345 instead of Richard.howard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Authentication mean in the IAAA context?

A

Verifying the Identification claim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Authorization mean in the IAAA context?

A

Allowing the subject access to objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does Accountability mean in the IAAA context?

A

Establishing the ability to determin which actions each subject performed on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does Access Creep mean in the Access Control context?
When one **subject** maintains old access rights as he moves from one division to another gaining additional access rights.
26
When can a **subject** and an **object** refere to the same thing?
The IE Browser is a Subject when it is running but is an Object when its executable is stored on the hard drive.
27
Name the two types of entities in Access Control
Subjects Objects Keep all access control examples simple by determining which elements are subjects and which elements are objects.
28
Name the three primary access control models ## Footnote
1: Discretionary Access Control (DAC) 2: Mandatory Access Control (MAC) 3: Non-Discretionary Access Control
29
Is any one Access Control Model 1: Discretionary Access Control (DAC) 2: Mandatory Access Control (MAC) 3: Non-Discretionary Access Control better than the other?
No one model is better than the other, rather each model is used for a specific information security purpose. ## Footnote
30
Is Non-Discretionary Access Control a form of Mandatory Access Control (MAC)
No
31
What is Discretionary Access Control (DAC)?
Gives **subjects** full control of **objects** they have been given access to including sharing with other subjects. DAC allows **subjects** the ability to grant other **subjects** access to their files (**objects**), change their attributes, alter them or delete them.
32
Name two operating systems that use Discretionary Access Control (DAC)
1: Windows 2: Linux
33
Name one weakness in Discretionary Access Control (DAC)
**Confidentiality Protection** because the system depends on user discretion; a user can mistakenly send a file to someone who has no business of seeing the information in that file.
34
What is Mandatory Access Control (MAC)?
A system enforced access control model based on the **subject’s** clearance and the **object’s** labels.
35
In Mandatory Access Control (MAC) systems, Subjects and Objects have
**labels** like SECRET and TOP SECRET.
36
In Mandatory Access Control (MAC) systems, when can a **subject** access an **object**?
A **subject** may access any **object** if the **subject’s** label is equal to or greater than the **object’s** label.
37
What is the main difference in who enforces access to **objects** between Discretionary Access Control (**DAC**) and Mandatory Access Control (**MAC**):
**MAC** uses the system to enforce access control based on the **subject’s** clearance and the **object’s** labels. **DAC** counts on the **Subject** to use discretion in providing other **subjects** access to his **objects**
38
What part of the CIA model does Mandatory Access Control (MAC) systems focus on?
MAC systems focus on protecting **Confidentiality** in the CIA model.
39
Name two liabilities of Mandatory Access Control (MAC) systems compared to Discretionary Access Control (DAC) systems.
1: MAC systems are expensive compared to DAC. Clearing users is expensive. 2: MAC systems are difficult to implement especially when attempting to separate different confidentiality levels within the same interconnected IT system.
40
Name three Mandatory Access Control (MAC) systems
1: Honeywell’s SCOMP developed in conjunction with the US and the UK 2: Purple Penelope developed in conjunction with the US and the UK 3: LINUX Intrusion Detection System (Standard LINUX is DAC)
41
What is Non-Discretionary Access Control?
A system enforced access control model that cannot be changed at the discretion of ordinary users. Users do not have discretion regarding the groups of objects they are allowed to access and they are unable to transfer objects to other subjects.
42
Is Role Based Access Control (RBAC) a type of Non-Discretionary Access Control or Discretionary Access Control (DAC) or Mandatory Access Control (MAC)
Non-Discretionary Access Control
43
Name the three characteristics (Rules) of Role Based Access Control (RBAC) ?
1: Role Assignment: 2: Role Authorization: 3: Transaction Authorization:
44
In Role Based Access Control systems, is the **Identification** and **Authentication** process (Login) considered a **transaction**.
The Identification and Authentication process (Login) is **not** considered a transaction.
45
What does Role Assignement mean as the first Rule of Role Based Acces Control?
A subject can execute a transaction only if the subject has been assigned the proper role. Subjects are grouped into roles. Users can take on only roles for which they authorized.
46
What does Role Authorization mean as the second rule of Role Based Access Control?
A subject’s role must be authorized. Each role has access permissions based upon the role and not the position.
47
What does Transaction Authorization mean as the third rule in Role Based Access Control?
A subject can execute a transaction only if the transaction is authorized for the role. Users can execute only transactions for which they are authorized.
48
Why is Role Based Access Control (RBAC) a form of Non-Discretionary Access Control and not Discretionary Access Control (DAC)?
RBAC is a type of non-discretionary access control becuase **subjects** do not have the discretion regarding groups of **objects** they are allaowed to access,and are unable to transfer **objects** to other **subjects**.
49
Why is Role Based Access Control (RBAC) a form of Non-Discretionary Access Control and not Mandatory Access Control (DAC)?
There is a superficial similarity between RBAC roles and traditional groups (MAC). As normally implemented, a MAC group is a collection of users, rather than a collection of permissions The ability to tie permissions directly to users in a group-based mechanism can be regarded as a "loophole" that makes it difficult to control user-permission relationships. RBAC requires all access through roles, and permissions are connected only to roles, not directly to users.
50
What type of access control is Task Based Access Control?
Non-Discretionary Access Control
51
Is Content Dependent Access Control a full fledged access control system like DAC, MAC or RBAC?
No Not full-fledged access controls like MAC and DAC but added in, like defense in depth, for extra protection.
52
Is Context Dependent Access Control a full fledged access control system like DAC, MAC or RBAC?
No Not full-fledged access controls like MAC and DAC but added in, like defense in depth, for extra protection.
53
What is Content Dependent Access Control?
They add additional criteria beyond Identification and Authentication. They consider the actual content. Example: Subjects can view their Timesheet but not the CEOs.
54
What is Context Dependent Access Controls?
Applies additional context before granting access. Example: Login time.
55
What is Centralized Access Control?
Centralized Access Control concentrates access control in one logical point for a system or organization like Single Sign On.
56
What is Decentralized Access Control?
Decentralized Access Control (Distributed Access Control) distributes control to local sites and independent systems.
57
What is one advantage to Decentralized Access Control?
Provides more local power Example: A US Soldier in a battlefield situation cannot call back to the help desk.
58
What is one disadvantage to Decentralized Access Control?
One risk is an inconsistent view across the organization even if there is a uniform policy. Example: A US Soldier in a battlefield situation cannot call back to the help desk.
59
Can both Centralized Access Control and Decentralized Access Control support remote users authenticating to local systems.
Yes
60
Are DAC (Discretionary Access Control) and Decentralized Access Control the same thing?
No Decentralized Access Control will always be spelled out in the exam.
61
What are the 7 Remote frameworks and protocols to support remote login? ## Footnote
1. RADIUS 2. Diameter 3. TACACS 4. TACACS+ 5. PAP 6. CHAP 7. Microsoft Active Directory
62
What does Radius stand for in the Access Control Protocols and Frameworks contrext?
**R**emote **A**uthentication **D**ial **I**n **U**ser **S**ervice
63
What two RFCs describe Radius?
RFC 2865 and 2866
64
What protocol and port does Radius **officially** use for authentication?
Radius **officially** uses the User Datagram Protocol (UDP) on port 1812 (authentication)
65
What protocol and port does Radius **officially** use for accounting?
Radius **officially** uses the User Datagram Protocol (UDP) on port 1813 (accounting).
66
What protocol and port does Radius **unofficially** use for authentication?
Some Radius systems **unofficially** usethe the User Datagram Protocol (UDP) on ports 1645 (authentication) a
67
What protocol and port does Radius **unofficially** use for accounting? ## Footnote
Some Radius systems **unofficially** use the User Datagram Protocol (UDP) on port 1646 (accounting).
68
Why do experts consider RADIUS to be an AAA system and not an IAAA? ## Footnote
Does not provide any Identiy function. It does **Authenticate** a subject’s credentials against an authentication database. **Authorize** users by allowing specific user’s access to specific data objects. Provide **Accountability** by creating a log entry for RADIUS connection made.
69
In Radius,request and response data is carried in what?
Attribute Value Pairs (AVP)
70
According to RFC 2865, what are the 8 Radius Attribute Value Pairs (AVPs)?
Access-Request ## Footnote Access-Accept Access-Reject Accounting-Request Accounting-Response Access-Challenge Status-Server (Experimental) Status-Client (Experimental)
71
In Radius, how large is the field that holds Attribute Value Pairs (AVPs)?
Uses an 8-bit field for Attribute Value Pairs (AVPs) which gives a max of 256 total pairs.
72
Iin radius, what is the only element that is encrypted?
Radius Only encrypts the password; sends other data (ID for example) in the clear.
73
Name five problems with Radius.
1: Limited Accountability - just logs login transactions 2: Flexibility – limited functionality with 8 bit AVPs 3: Scalability – Decentralized nature makes it hard to scale 4: Reliability – Uses UDP TCP 5: Security – Does not encrypt everything
74
Whys is Diameter considered to be an improved successor to Radius?
1: Accounability Improved – more robust accounting capability 2: Flexibility Improved - 32 bit field provides for billions AVPs 3: Scalability Improved – Centralized server makes it easier to scale 4: Reliability Improved – Uses TCP 5: Security Improved –End to end encryption
75
What is the Draft standard that describes the Diameter protocol?
RFC 3588.
76
What does TACACS stand for?
Terminal Access Controller Access Control System (TACACS).
77
What is TACACS?
An older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server, sometimes called a TACACS daemon or simply TACACSD, to determine whether access can be allowed to a given system.
78
What does TACACS stand for?
Terminal Access Controller Access Control System ## Footnote
79
What port does TACACS communicate with?
UDP 49
80
Why is TACACS less secure than TACACS+ and Radius?
It was orignially designed to be an encryption protocol, not an authentication protcol.
81
Is TACACS+ backward compatible with TACACS?
No
82
Whys is TACACS+ more reliable than TACACS?
Because it uses TCP instead of UDP.
83
What port does TACACS+ communicate with?
TCP 49
84
Why is TACACS+ more secure than TACACS.
1: Improves password protection by allowing two-factor authentication;
85
Why is TACACS+ more secure than Radius?
Encrypts all data below the header (Better security than RADIUS)
86
Name two Sniffers.
SNORT Cain & Abel
87
What does PAP stand for?
Password Authentication Protocol
88
What is the Password Authentication Protocol (PAP)?
The client authenticates itself by sending a user name and an (optionally encrypted) password to the server, which the server compares to its shared secrets database.
89
What RFC defines the Password Authentication Protocol (PAP)?
Defined by RFC 1334.
90
Why is security weak with the Password Authentication Protocol (PAP)?
Password are sent in the clear; Sniffers can pick them up. This technique is vulnerable to eavesdroppers who may try to obtain the password by listening in on the serial line, and to repeated trial and error attacks.
91
How does the Challenge Handshake Authentication Protocol (CHAP) work?
The server sends a randomly generated ``challenge'' string to the client, along with its hostname. The client uses the hostname to look up the appropriate secret, combines it with the challenge, and encrypts the string using a one-way hashing function. The result is returned to the server along with the client's hostname. The server now performs the same computation, and acknowledges the client if it arrives at the same result.
92
What does CHAP stand for?
Challenge Handshake Authentication Protocol (CHAP)
93
What RFC defines the CHallenge Handshake Authentication Protocol (CHAP)?
Defined by RFC 1994
94
In the Challenge Handshake Authentication Protocol (CHAP), is authentication one way or both ways?
Authentication is one waybut using the same secret, negotiating CHAP in both directions can be facilitate authentication in both directions.
95
Why is the Challenge Handshake Authentication Protocol (CHAP) more secure then the Password Authentication Protocol (PAP)?
Depends on a shared secret that is not sent across the wire. Provides protection against Playback Attacks since a Sniffer will not know the shared secret.
96
What protocol is Microsoft's Active Directory based on?
Kerberos
97
What RFC describes the Kerberos protocol ?
RFC 1510
98
How long has Kerberos been integrated into the Windows Operating system?
Since Windows 2000
99
In Active Directory (Kerberos) does each domain operate in its own authentication space?
Yes
100
In Active Directory (Kerberos) can each domain contain different users, network assets, and data objects?
Yes
101
In Active Directory (Kerberos) how does Active Directory control access to data objects?
!: Users are placed into Groups 2: Each group may be granted access to various domains within the system.
102
In Active Directory (Kerberos), If a two-way trust is established between two domains, can users and data objects from each domain access groups belonging to either domain?
Yes
103
In Active Directory (Kerberos), If a one-way trust is established between two domains, can users from the trusted domain access resources in the trusting domain?
Yes
104
In Active Directory (Kerberos), can Trusts be either transitive or non-transitive.
Yes
105
In Active Directory (Kerberos), non-transitive trusts only exist between
two trust partners.and nobody else.
106
In Active Directory (Kerberos), transitive trusts exist between
the two partners and all of their partner domains.
107
What are the three concepts that affect Access Control but must be addressed by an organizations procedures:
1: Least Privilege: 2: Separation of Duties: 3: Rotation of Duties
108
In the Procedural Issues for Access Control context, what is **Least Privilege**?
Limiting the access of authorized users to data they require to perform their duties only.
109
In the Procedural Issues for Access Control context, what is **Separation of Duties**?
1: Allows an organization to maintain checks and balances among employees for privileged access. 2: Mandating that more than one person is required for a sensitive transaction.
110
In the Procedural Issues for Access Control context, what is a **Separation of Duties** example?
Nuke Control ## Footnote
111
In the Procedural Issues for Access Control context, what is **Rotation of Duties**?
When leadership rotates the staff through the same duties.
112
In the Procedural Issues for Access Control context, what risk does **Rotation of Duties** mitigate?
Collusion
113
In an Access Control context, objects have ______ for classification?
Labels
114
In an Access Control context, name three typical labels used by governments.
Confidential Secret Top Secret
115
In an Access Control context, Unauthorized disclosure of which could reasonably expect to cause damage to national security. is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Confidential
116
In an Access Control context, Unauthorized disclosure of which could reasonably expect to cause **serious** damage to national security. is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Secret
117
In an Access Control context, Unauthorized disclosure of which could reasonably expect to cause **grave** damage to national security. is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Top Secret
118
In an Access Control context, Which US executive order defines classification criteria?
Executive Order 12356 – National Security Information ## Footnote
119
In an Access Control context, Data that is not sensitive is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Unclassified
120
In an Access Control context, Sensitive but unclassified and is not a matter of national security (Example: Healthcare). is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Sensitive But Unclassified (SBU)
121
In an Access Control context, Certain types of unclassified information require access and distribution controls; is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
Controlled Unclassified Information (CUI):
122
In an Access Control context, Unauthorized disclosure of which could adversely impact a person's privacy or welfare, the conduct of Federal programs, or other programs or operations essential to the national interest. is the definition of which label? Unclassified Sensitive But Unclassified (SBU): Controlled Unclassified Information (CUI): For Official Use Only (FOUO) Confidential Secret Top Secret
For Official Use Only (FOUO):
123
In an Access Control context, **Labels** enforce which CIA (Confidentiality, Integrity, Availability) Concept? Kneed to Know ot Least Privelege
Least Privelege
124
In an Access Control context, **Compartments** enforce which CIA (Confidentiality, Integrity, Availability) Concept? Kneed to Know ot Least Privelege
Kneed to Know
125
In an Access Control context, In the US Government, these programs are examples of what HCS COMINT (SI) GAMMA (G) TALENT KEYHOLE (TK)
Sensitive Compartmented Information (SCI)
126
In an Access Control context, In the private sector, name two typical compartments of information.
Internal Use Only ## Footnote Proprietary
127
In an Access Control context, subjects have ______ for determining access to certain objects?
Clearances
128
In an Access Control context, What is a subject's Clearance?
1: A determination about whether or not a person can be **trusted** with a specific level of information. 2: Assesses current and potential **trustworthiness**.
129
In an Access Control context, True or False In many world governments, the clearance name mirrors the object label name.
True ## Footnote
130
In an Access Control context, To receive each level of clearance, subjects must undergo \_\_\_\_\_
A myriad of different investigations and the collection of personal data. ## Footnote
131
In an Access Control context, Name three areas of investigation that are typically reviewed to get a clearance
1: Credit Score 2: Arrest Record 3: Neighbor and friend Interviews
132
In an Access Control context, Once the clearance investigation is complete, who an makes a determination for approval?
administrative judge ## Footnote
133
In an Access Control context, In a clearance investigation,what are two common reasons to disapprove a clearance?
Drug Use ## Footnote Foreign Influence
134
In an Access Control context, What is the definition of a Formal Access Approval process?
Documented approval from the **Data Owner** for a **subject** to access certain **objects**. ## Footnote
135
In an Access Control context, In a Formal Access Approval process, name two requirements.
1: Requires the **subject** to understand the rules for **accessing** data. 2: Requires the **subject** to understand the **consequences** should the data become Lost Destroyed Compromised
136
In an Access Control context, What are two methods that you can use to control subjects access to objects?
1: Rule Based Access Controls 2: Access Control Lists
137
In an Access Control context, What are Rule Based Access Controls?
Use a series of defined rules, restrictions and filters for accessing objects. Uses If-Then statements. Example: If the subject is authorized to surf the web, and the site is on the authorized list, then allow access.
138
In an Access Control context, What are Access Control Lists?
A list of objects that specific subjects can access. These technologies use a form of Access Control Lists
139
In an Access Control context, List three typical technologies that use Access Control Lists.
1: Firewalls 2: Routers 3: Border Access Devices
140
In an Access Control context, For both "**Rules Based Access Control**" and "**Access Control Lists**", what procedure must you have in place?
Must plan for and implement a routine update procedure.
141
In an Authentication Method context, What is a Credential Set?
A **Credential Se**t is the combination of the **Identification** and the **Authentication** of a **subject**.
142
What are the three Access Control Categories?
1: Administrative or Directive 2: Technical Controls 3: Physical Controls
143
What are five typical programs for the Administrative Category?
1: Policy 2: Procedure 3: Regulating 4: Training 5: Awareness
144
What is a Technical Control?
automated controls that provide logical restrictions Routers Firewalls Encryption etc
145
What is a Physical Control?
Uses physical devices to provide barriers Locks Fences Gates Security Guards Etc
146
In a Access Control Category context, what is a **Preventive Control**?
Prevents actions from occurring. Applies restrictions to what a potential subject can do. Potential subjects can be authorized or not
147
In a Access Control Category context, Give an example of a **Administrative** **Preventive Control**?
Pre-employment drug screening designed to prevent an organization from hiring a drug user.
148
In a Access Control Category context, Give an example of a **Technical Preventive **** Control**?
Establishing privileges on a system for specific subjects.
149
In a Access Control Category context, Give an example of a **Physical Preventive **** Control**?
A fence to protect a facility.
150
In a Access Control Category context, True or False Preventive and Preventative are synonyms for the test.
True
151
In a Access Control Category context, What is a Detective Control?
Controls that alert during or after a successful attack.
152
In a Access Control Category context, Give two examples of **Technical Detective Controls**
1: Intrusion Detection Systems (IDS) 2: Closed Circuit TV (CCTV)
153
In a Access Control Category context, What is a Corrective Control?
Corrects damaged system or process. Typically works hand-in-hand with Detective Controls
154
In a Access Control Category context, What is a Recovery Control?
Actions taken to recover from a security incident like Rebuild the laptop Restore from tapes
155
In a Access Control Category context, What is a Administrative Corrective Control exmple?
Intrusion Detection System alerts to a possible attack on port 446 and blocks the port (Corrective). Anti-Virus discovers that the target is still infected. You have to rebuild the machine (Recovery).
156
In a Access Control Category context, What is a Deterrent Control?
Deter subjects from performing actions on a system.
157
In a Access Control Category context, What is a Physical Deterrent Example?
Beware of Dog Sign
158
In a Access Control Category context, What are two Administrative Deterrent Example?
1: Large fines for speeding 2: Sanction Policy that says employees will be fired of surfing porn sites.
159
In a Access Control Category context, What is a Compensating Control?
Additional controls put in place to compensate for other control weaknesses.
160
In a Access Control Category context, Name three types of Authentication Types and an extra
Type 1: Something You Know Type 2: Something You Have Type 3: Something You Are Extra: Some Place You Are
161
In a Access Control Category context, What is Strong Authentication?
By using two of the three types of authentication together Type 1: Something You Know Type 2: Something You Have Type 3: Something You Are Extra: Some Place You Are
162
In a Access Control Category context, What is Something You Know?
Requires testing the subject with some sort of Challenge and Response.
163
In a Access Control Category context, What are four typical Challenge and Response Mechanisms for Something You Know?
1: Static Password 2: Passphrase 3: One Time Password 4: Dynamic Passwords .
164
In a Access Control Category context, What is a static password?
Reusable and may not expire. User generated
165
In a Access Control Category context, What are two weaknesses to a static password?
1: Good ones are hard to remember; Subjects may be tempted to write them down in order to remember them. 2: Inherently limited, regardless of the complexity, because it can be stolen.
166
In a Access Control Category context, What is the easiest and often weakest form of authentication? Static Passwords Passphrase One Time Password Dynamic Passwords
Static Passwords ## Footnote
167
In a Access Control Category context, What is another name for Strong Autentication?
multi-factor authentication ## Footnote
168
In a Access Control Category context, What is a password hash?
Typically – clear text passwords are not store on IT systems; their hashes are. Hashing is a one-way encryption using an algorithm and no key and cannot be reversed.
169
In a Access Control Category context, What does Microsoft LanMan do to passwords before it creates the hash? .
converts all passwords to uppercase before hashing
170
In a Access Control Category context, What is password cracking? .
When the attacker guesses at the password and runs them through the hash algorithm.
171
In a Access Control Category context, What are three password cracking techniques? .
1: Dictionary Attacks: 2: Brute Force Attacks 3: Hybrid Attacks
172
In a **Password Cracking** context, what is a **Dictionary Attack**? .
The attacker uses a predefined list of words and runs them through the hash algorithm.
173
In a **Password Cracking** context, what is a mitigating control against a **Dictionary Attack**? .
Subjects can thwart dictionary attacks by adding special characters to their password.
174
In a **Password Cracking** context, What is a **Brute Force** attack ? .
The attacker calculates the hash of every possible word and stores them in **Rainbow Tables**.
175
In a **Password Cracking** context, What is a **Rainbow Table**? .
For **Brute Force Attacks**, the attacker calculates the hash of every possible word and stores them in **Rainbow Tables**.
176
In a **Password Cracking** context, What is are two weaknesses to **Brute Force Attacks**? .
1: Take time 2: Rainbow Tables may not be complete.
177
In a **Password Cracking** context, What is more effective: **Brute Force Attacks** or **Dictionary Attacks?**
Brute Force Attacks ## Footnote
178
In a **Password Cracking** context, What is a **Hybrid Attack?**
Taking a dictionary list and appending hashes for word combinations like replacing the letter “o” with the number “0.” ## Footnote
179
In a **Password Cracking** context, Where does UNIX typicall store password hashes?
Typically stores password hashes in /etc/shadow only accessible by root. ## Footnote
180
In a **Password Cracking** context, Where does Windows typicall store password hashes?
Stores password hashes locally and on the Domain Controller in a file called the Security Account Management (SAM) file. ## Footnote If a subject cannot reach the Domain Controller, then the local system may use the local hash.
181
In a **Password Cracking** context, What is a mitigating control against **Brute Force Attacks**?
Access to the SAM file and the Shadow file should be limited. ## Footnote
182
In a **Password Cracking** context, What is the SAM file on Windows Systems?
The Security Account Management (SAM) file ## Footnote
183
In a **Password Cracking** context, What is the Shadow file on UNIX Systems?
Typically stores password hashes ## Footnote
184
In a **Password Cracking** context, What are two tools used by hackers to crack the SAM (Security Account Management ) File on Windows?
fgdump “Cain and Abel”
185
In a **Password Cracking** context, What is a SALT?
UNIX / LINUX systems combine passwords with SALTS so that two subjects using the same password will generate completely different hashes
186
In a **Password Cracking** context, What is a Mitigating control for UNIX/LINUX systems to protect against **Brute Force Attacks**?
SALTS the attacker now has to hash the same password many times with each salt used.
187
In a **Password Cracking** context, According to both Microsoft and the US Department of Defense. What is the number of passwords the OS should remember?
24 ## Footnote
188
In a **Password Cracking** context, According to both Microsoft and the US Department of Defense. What is the maximum number of days that a password can be used.?
90 ## Footnote
189
In a **Password Cracking** context, According to both Microsoft and the US Department of Defense. What is the minimum number of days that a password can be used; to ensure that subjects do not cycle through their password history 24 times in one session to get back to their original password.?
2 ## Footnote
190
In a **Password Cracking** context, According to both Microsoft and the US Department of Defense. What is the minimum number of characters allowed in a password?
8 ## Footnote
191
In a **Password Cracking** context, According to both Microsoft and the US Department of Defense. True or False Passwords must meet complexity requirements?
True ## Footnote
192
What is Type 2 Authentication: Something You Have
Requires something that a user possesses. ## Footnote
193
In a Access Control Category context, What is Type 1 Authentication?
Type 1: Something You Know
194
In a Access Control Category context, What is Type 2 Authentication?
Type 2: Something You Have
195
In a Access Control Category context, What is Type 3 Authentication?
Type 3: Something You Are
196
In a Access Control Category context, What is an extra type of authentication besides the first three?
Extra: Some Place You Are
197
In a Type 2 Authentication (Something You Have) context, What is a token?
An object that helps prove an identity claim. ## Footnote
198
In a Type 2 Authentication (Something You Have) context, Name three examples of typical tokens
Car Keys Credit Cards Paper Documents ## Footnote
199
In a Type 2 Authentication (Something You Have) context, What is a Synchronous Dynamic Token?
Uses time or counters to synchronize a displayed token code with the same code on an authentication server.
200
In a Type 2 Authentication (Something You Have) context, What is a Time-Based Synchronous Dynamic Token?
Codes change frequently ## Footnote The authentication server knows the serial number of each authorized token, the subject associated to it and the time. With these three parameters, it can predict the valid dynamic code for each token.
201
In a Type 2 Authentication (Something You Have) context, What is a Counter-Based Synchronous Dynamic Token?
The Authentication Server expects Token 1 first, then Token 2, then Token 3, etc. ## Footnote
202
In a Type 2 Authentication (Something You Have) context, With both Time-based and Counter-based Synchronous Dynamic Tokens What are the typical two factors used?
1: Authentication pair (username and password/pin) (Something they know) 2: The dynamic token code (Something they have).
203
In a Type 2 Authentication (Something You Have) context, What is a Asynchronous Dynamic Token?
Not synchronized with a authentication server
204
In a Type 2 Authentication (Something You Have) context, with a Asynchronous Dynamic Token model, what is the typical method called?
A challenge-response Token
205
In a Type 2 Authentication (Something You Have) context, how does the Asynchronous Dynamic token challenge-response model work?
1: Subject enters username (Identity Claim) 2: System sends challenge 3: Subject enters challenge-answer and pin (Something you know [Type 1] and something you Have[Type 2]) 4: Token generates response and sends to system
206
What is Type 3 Authentication: Something You Are
Biometrics
207
What is Biometrics?
Uses physical characteristics as a means of Identification or Authentication. From the Greek words bios (life) and metric (measurement).
208
What is a weakness in Type 1 Authentication (Something You Know)?
The subject has to remember a password. ## Footnote
209
What is one pro of biometrics over Type 1 Authentication (Something You Know) ## Footnote
Eliminates the need for the subject to remember a password. ## Footnote
210
True or False Biometric data is considered PII and should be protected accordingly.
True ## Footnote
211
Name 5 characteristics of a good Biometric System
1: Must be reliable and resistant to counterfeiting. 2: The data storage requirement (template or file size) should be small (1000 bytes or less). 3: Should not cause undue psychological stress (Retina scans are rairly used for this reason) 4: Must be useable by all staff or compensating controls must exist. 5: Any biometric that facilitates the exchange of body fluids is a serious negative (Retina Scans, Fingerprint scans).
212
In a biometric context, what is enrollment?
A one-time process to register with a biometric system that should take less than two minutes Creating the account with Identity-Authentication pair associated with the biometric information.
213
In a biometric context, what is Throughput?
Describes the process of authenticating with a biometric system.
214
In a biometric context, what is good Throughput number?
The biometric response time should be no more than 6-10 seconds.
215
What are the three biometric accuracy metrics?
1: False Reject Rate (FRR) (Type I Errors) 2: False Accept Rate (FAR) (Type II Errors) 3: Crossover Error Rate (CER)
216
In a biometric accuracy metric context, what is a FRR
False Reject Rate (FRR) (Type I Errors)
217
In a biometric accuracy metric context, what type of error is Type I Error?
False Reject Rate (FRR) (Type I Errors)
218
In a biometric accuracy metric context, what type of error is Type II Error?
False Accept Rate (FAR) (Type II Errors)
219
In a biometric accuracy metric context, what is a Type II Error?
False Accept Rate (FAR) (Type II Errors)
220
In a biometric accuracy metric context, What is False Reject Rate (FRR) (Type 1 Error)?
The rate at which an authorized subject is rejected by the biometric system.
221
In a biometric accuracy metric context, What are three problems high False Reject Rates (FRR) (Type 1 Errors) cause?
1: Authorized subject frustration 2: Reduction in work dueto poor access conditions 3: Expenditure of resources to revalidate authorized users
222
In a biometric accuracy metric context, What is the main problem with any False Accept Rates (FARs) (Type 2 Errors)?
Unauthorized subjects gain access to the system.
223
In a biometric accuracy metric context, What is worse? False Reject Rate (FRR) (Type 1 Errors) False Accept Rates (FARs) (Type 2 Errors)?
A False Accept Rate (FAR – Type 2 Error) is worse than a False Reject Rate (FRR – Type 1 Error) because it is better to reject a legitimate subject then it is to accept an imposter.
224
In a biometric accuracy metric context, What is the Crossover Error Rate (CER)?
The point where the False Reject Rate (FRR – Type I Error) and False Accept Rate (FAR – Type 2 Error) are equal.
225
In a biometric accuracy metric context, What is another name for the Crossover Error Rate (CER)?
Equal Error Rate (ERR)
226
In a biometric accuracy metric context, What is the purpose of the Crossover Error Rate (CER)?
Crossover Error Rate (CER) is a comparison metric for different biometric devices and technologies.
227
In a biometric accuracy metric context, What is the significance of the Crossover Error Rate (CER)?
As an identification device becomes more sensitive or accurate, its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal, or cross over. Using the CER as an impartial judgment of a biometric system helps create standards by which products from different vendors can be fairly judged and evaluated.
228
In a biometric accuracy metric context, What are 8 typical biometric controls?
1: Fingerprints 2: Retina Scan 3: Iris Scan 4: Hand Geometry 5: Keyboard Dynamics 6: Dynamic Signature 7: Voice Prints 8: Facial Scans
229
In a biometric accuracy metric context, What is the widely used Biometric Control today?
1: Fingerprints ## Footnote
230
In a biometric accuracy metric context, How do fingerprint scans work?
The data stored is a mathematical representation of fingerprint minutiae (Friction Ridges) like ## Footnote Whorls Ridges Bifurcation
231
In a biometric accuracy metric context, How do retina scans work?
A laser scan of the capillaries which feed the retina of the back of the eye; Maps the blood vessels of the eye. ## Footnote
232
In a biometric accuracy metric context, Why are retina scans rarely used?
Retina scans are rarely used because of the health risks and invasion-of-privacy issues.
233
In a biometric accuracy metric context, How do Iris scans work?
A passive biometric control where a camera takes a picture of the iris (the colored portion of the eye). The system compares the picture to the stored info in the database.
234
In a biometric accuracy metric context, Name 4 pros to Iris scans?
1: It works through contact lenses and glasses. 2: High accuracy 3: Passive (May be done without the subject knowing) 4: No exchange of body fluids.
235
In a biometric accuracy metric context, How do Hand Geometry scans work?
A passive biometric control that takes measurements from specific points in the hand. Length Width Thickness Surface Area
236
In a biometric accuracy metric context, Name one pro for Hand Geometry scans?
Simple devices where the stored information (template or file size) is very small.
237
In a biometric accuracy metric context, How do Keyboard Dynamics systems work?
Measures how hard a subject presses each key and the rhythm that each key is pressed.
238
In a biometric accuracy metric context, Name two pros to Keyboard Dynamics systems?
1: Cheap to implement 2: Reliable but not perfect.
239
In a biometric accuracy metric context, How do Dynamic Signature system work?
Measures the process by which a subject signs his name. It is similar to Keyboard Dynamics. It measures Time Pressure Loops Beginning and end points
240
In a biometric accuracy metric context, Name two pros to Dynamic Signature systems?
1: Cheap to implement 2: Reliable but not perfect. Similar to Keyboard Dynamics systems
241
In a biometric accuracy metric context, How do Voice Print systems work?
Measures the subject’s tone of voice while saying a specific sentence or phrase
242
In a biometric accuracy metric context, Name two cons to Voice Print systems?
1: Vulnerable to replay attacks 2: Vulnerable to changes in the subject’s voice due to illness.
243
In a biometric accuracy metric context, Name a countermeasure to Voice Print replay attack?
Subjects insert random words.
244
In a biometric accuracy metric context, How do facial scan systems work?
Passively takes a picture of the subject’s face and compares it to other pictures in a stored database. Uses facial geometry to distinguish between faces. Measures unique distances between facial features compared to the size of the face.
245
In a biometric accuracy metric context, Name one pro to facial scan systems?
Disguises do not fool it.
246
In a biometric accuracy metric context, Name one con to facial scan systems?
Expensive
247
In a biometric accuracy metric context, What is a good use facial scan systems?
Not typically used for Biometric authentication control because of the high cost but is a good solution for very important systems.
248
In a biometric accuracy metric context, What is the extra authentication type besides Types 1, 2 and 3?
Authentication: Somewhere You Are
249
In a biometric accuracy metric context, How does Authentication (Somewhere You Are) systems work?
Global Positioning System (GPS) IP-Based Geo-location Physical location of Point of Sale Devices To deny access if the subject is in the wrong location.
250
In a Access Control Technologies context, What is a Single Sign-On (SSO) system?
Allows multiple subjects to use a central authentication server (AS) to access and maintain multiple systems.
251
In a Access Control Technologies context, Name three benefits to Single Sign-On (SSO) systems?
1: Improved **User Productivity** because subjects do not have to remember Identity – Authentication pairs for multiple systems. 2: Improved **Developer Productivity** because by providing a common authentication framework. 3: **Simplified Administration** because system admins only have to maintain one system.
252
In a Access Control Technologies context, Name three disadvantages to Single Sign-On (SSO) systems?
1: **Difficult to retrofit**; especially legacy systems. 2: **Unattended Computer**: With SSO, if a subject walks away from his computer, then anybody could have access to all of his resources. With a Multiple Sign On system, the damage is limited to only the one device. 3: **Single point of Attack**: A hacker only has to compromise one system to have the keys to the city.
253
In a Access Control Technologies context, Name three disadvantages to Single Sign-On (SSO) systems?
1: **Difficult to retrofit**; especially legacy systems. 2: **Unattended Computer**: With SSO, if a subject walks away from his computer, then anybody could have access to all of his resources. With a Multiple Sign On system, the damage is limited to only the one device. 3: **Single point of Attack**: A hacker only has to compromise one system to have the keys to the city.
254
In a Access Control Technologies context, What is Kerberos?
It is a network authentication system for use on physically insecure networks, based on the key distribution model presented by Needham and Schoreder.
255
In a Access Control Technologies context, What is Kerberos named after in Greek mythology?
The name (also called Cerebrus) of the Three Headed Dog in Greek Mythology that guards the entrance to Hades.
256
In a Access Control Technologies context, What do the three heads of Cerebrus signify in the Kerberos system?
Authentication Authorization Accountability but the original Kerberos only provided authentication. or The Client the KDC (Key Distribution Center) and the server
257
In a Access Control Technologies context, Name three advantages of the Kerberos system?
1: ProvidesAAA while **preventing eavesdropping attacks.** 2: Provides for **data stream integrity** (**Detection** and **Modification**) 3: Prevents unauthorized Reading
258
In a Access Control Technologies context, In the Kerberos system, what is a **Principlal**?
Client or Service ## Footnote
259
In a Access Control Technologies context, In the Kerberos system, what is a **Realm**?
A logical Kerberos network; ## Footnote
260
In a Access Control Technologies context, Does the Kerberos system use **Asymmetric** or **Symmertric** encryption?
All entities have a common shared secret in order to communicate with trust. All messages are encrypted using Symmetric Key Encryption (Not PKI).
261
In a Access Control Technologies context, with the Kerberos system, what is a **Ticket**?
: Data that authenticates a principal’s identity.
262
In a Access Control Technologies context, with the Kerberos system, what is a **Credential**?
A **Ticket** and a **Service Key** ## Footnote
263
In a Access Control Technologies context, with the Kerberos system, what is the **KDC**?
Key Distribution Center ## Footnote
264
In a Access Control Technologies context, with the Kerberos system, what idoes the **Key Distribution Center** do??
Authenticates principals by storing a cryptographic key known only to the security principal and the KDC. This key is used in exchanges between the security principal and the KDC and is known as a long term key.
265
In a Access Control Technologies context, with the Kerberos system, How is the **Long Term Key** derived
from a user's logon password.
266
In a Access Control Technologies context, with the Kerberos system, what is the TGT
Ticket Granting Ticket
267
In a Access Control Technologies context, with the Kerberos system, what does the TGT (Ticket Granting Ticket) do?
Allows the client to request service tickets and is analogous to a passport - i.e. it is valid for a certain period after which it expires; however once the TGT has been issued, there is no further use of passwords or other logon factors.
268
In a Access Control Technologies context, with the Kerberos system, name two attacks that Kerberos does not protect agasint
1: "Denial of service" attacks 2: "Password guessing" attacks
269
In a Access Control Technologies context, with the Kerberos system, name three assumptions that Kerberos uses in its design
1: Principals must keep their secret keys secret. 2: Each host on the network must have a clock which is "loosely synchronized" to the time of the other hosts 3: Principal identifiers are not recycled on a short-term basis.
270
In a Access Control Technologies context, with the Kerberos system, name four reasons why authentication is secure
1: Passwords do not appear as plaintext 2: Does not rely on authentication by the host operating system 3: Does not base trust on IP addresses 4: Does not require physical security of the network hosts
271
In a Access Control Technologies context, with the Kerberos system, name four strengths
1: Provides mutual authentication 2: Defends against Rogue KDCs because passwords are never passed across the network 3: Mitigates replay attacks because of the use of timestamps. . 4: Stateless: credentials issued by the TGS or the KDC are good for the lifetime even if those systems are down.
272
In a Access Control Technologies context, with the Kerberos system, name four weaknesses
1: The KDC stores the plain text keys of all principlas. (Single Point of Failure) 2: Replay attacks are still possible for the lifetime of the authenticator. 3: In version 4, any user may request a session key. Eve may want to authenticate with Alice. The KDC sends a session key to Eve encrypted with Alice’s secret key. Eve can then try to brute force the key. In version 5, Kerberos added one additional step. Alice encrypts the current time with her key, thus If the authenticator’s timestamp is off by more than the clock skew (usually set to 5 minutes), the request is rejected. 4: Does not mitigate a malicious local host'; Plaintext keys may exist in memory. A malicious local user ot prpocess may be able to steal locally cached credentials.
273
In a Access Control Technologies context, with the Kerberos system, Describe the authentication process
Client → KRB\_AS\_REQ (Authenticator Alice Secret Key, Alice’s SID) → KDC KDC → Uses Alice’s SID to lookup Alice’s Secret Key KDC → Decrypts (Authenticator Alice Secret Key) with Alice Secret Key. If successful, KDC → KRB\_AS\_REP (TGT)TGS Secret Key → Client KDC → KRB\_AS\_REP (Session Key)Alice Secret Key → Client If Alice cannot decrypt (Session Key)Alice Secret Key, then the session key in invalid (Rogue KDC) If Alice can decrypt, Alice now has a valid Session Key.
274
In a Access Control Technologies context, with the Kerberos system, Describe The Ticket-Granting Service Exchange
Client → KRB\_TGS\_REQ (TGT)TGS Secret Key , Resource Request → TGS TGS → Decrypts (TGT)TGS Secret Key , with its own TGS Secret Key. If successful, TGS → KRB\_TGS\_REP (TGT)Resource Secret Key → Client
275
In a Access Control Technologies context, with the Kerberos system, Describe Getting access to a resource
Client → KRB\_AP\_REQ (TGT)Resource Secret Key → Resource Resource → Decrypts (TGT)Resource Secret Key with its own Resource Secret Key If Successful, the Resource knows the request is authenticated Resource → Checks if Alice is authorized to use the resource.
276
In a Access Control Technologies context, with the Kerberos system and Active Directory. Are the TGS and the KDC on the same server (True or False)
True
277
In a Access Control Technologies context, with the Kerberos system, Does the TGS authorize the principal to use a resource?
No Note: The TGS cannot determine if the user will be able to get access to the target server. It simply returns a valid ticket. Authentication does not imply authorization.
278
In a Access Control Technologies context, what does **SESAME** stand for?
**S**ecure **E**uropean **S**ystem for **A**pplications in a **M**ulti-vendor **E**nvironment
279
In a Access Control Technologies context, what is**SESAME?**
A sequel to Kerberos that adds asymmetric public key encryption. Mitigates Kerbero’s weakness of storing symmetric plain text keys on the KDC.
280
In a Access Control Technologies context, what does **SESAME** use in place of the Kerberos Tickets**?**
Uses **Privilege Attribute Certificates** (PACs) in place of the Kerberos Tickets.
281
In a Access Control Technologies context, What is one of the easiest way to verify that access controls are working ?
Audit security logs
282
In a Access Control Technologies context, name seven typical hardware and software devices that generate useful security logs
1: AV 2: IDS/IPS 3: Remote Access Software 4: Web Proxy 5: Vulnerability Management 6: Authentication Servers 7: Routers and Firewalls
283
In a Access Control Technologies, name six useful items to log on an operating system
1: System Events 2: Audit Records 3: Applications 4: Client Requests and Server Responses 5: Usage Information 6: Significant Operational Actions
284
In a Access Control Technologies, name five typical mistakes made during log analysis?
1: Logs are not reviewed on a timely or regular basis 2: Logs re not stored for long enough periods 3: Logs are not standardized or viewable by correlation toolsets 4: Log entries and alerts are not prioritized. 5: Logs are only reviewed for the bad stuff.
285
What are three general categories to describe attackers? ## Footnote
1: White Hat 2: Black Hat 3: Grey Hat
286
In the Assessing Access Control context, Name three narrow scope tests
1: Penetration Tests 2: Vulnerability Assessments 3: Security Audits
287
In the Assessing Access Control context, What is a Penetration Test?
A white hat hacker who receives permission to attempt to break into the system. Internet DMZ Wardialing Wireless Physical
288
In the Assessing Access Control context, What is a Zero-Knowledge (Black Box) Pen Tests
The White hat hacker has no knowledge of the system he is trying to break into.
289
In the Assessing Access Control context, What kind of box is a Zero-Knowledge Pen Tests
Black Box
290
In the Assessing Access Control context, What kind of box is a Full-Knowledge Pen Tests
Crystal Box
291
In the Assessing Access Control context, What is a Full-Knowledge (Crystal Box) Pen Test?
Full-Knowledge (Crystal Box) Pen Tests mean that the White Hat Hacker has inside knowledge
292
In the Assessing Access Control context, What is a Partial knowledge Pen Test?
Partial knowledge means that the white hat hacker has some knowledge.
293
In the Assessing Access Control context, Name three typical tools used by Pen Testers
1: Metasploit 2: CoreImpact 3: Immunity Canvas
294
In the Assessing Access Control context, Name the five step Pen Test methodology
1: Planning 2: Recon 3: Scanning (enumeration) 4: Exploitation 5: Reporting
295
In the Assessing Access Control context, What must a Pen Tester do If he finds evidence of a previous attack or violation of confidentiality or integrity,
stop and escalate to the customers. A Pen Tester Must protecting the confidentiality and Integrity of the systems they are testing.
296
In the Assessing Access Control context, Name to Vulnerability Assessment tools
1: Nessus 2: OpenVAS
297
In the Assessing Access Control context, What is a Security Audit?
A test against a published standard
298
In the Assessing Access Control context, Name five Broad Scope areas to assess and three narrow scope areas.
1: Policies 2: Procedures 3: Admin Controls 4: Change Management 5: Architectural Review 1: Pen Tests 2: Vuln Assessments 3: Security Audits
299
What type of password cracking will always be successful? ## Footnote A: Brute Force B: Dictionary C: Hybrid D:Rainbow Table
A: Brute Force
300
What is the difference between password cracking and password guessing ## Footnote A: They are the Same B: Password guessing attempts to log into the system. Password cracking attempts to determine a password used to create a hash. C: Password guessing uses Salts, password cracking does not. D: Password cracking risks account lockout, password cracking does not.
B: Password guessing attempts to log into the system. Password cracking attempts to determine a password used to create a hash.
301
The most insidious part of Phishing and Spear Phishing attacks come from which part of the attack anatomy? A: Each Phishing and Spear Phishing attack is socially engineered to trick the user to provide information to the attacker. B: Phishing and Spear Phishing attacks always have malicious code downloaded onto the user’s computer. C: Phishing and Spear Phishing attacks are poorly written. D: Phishing and Spear Phishing attacks are rarely successful.
A: Each Phishing and Spear Phishing attack is socially engineered to trick the user to provide information to the attacker.
302
What is the term used for describing when an attacker, through a command and control network, controls hundreds of, thousands, or even tens of thousands of computers and instructs all of these computers to perform actions all at once A: Flooding B: Spamming C: Phishing D: Botnets
D: Botnets
303
What are the main differences between retina scans iris scans? A: Retina scans are not invasive and iris scans are B: Iris scans invade a person’s privacy and retina scans do not. C: iris scans change depending on the person’s health, retina scans are stable. D: Retina scans change depending on the person’s health, iris scans are stable.
D: Retina scans change depending on the person’s health, iris scans are stable.
304
What is the most important decision an organization needs to make when implementing RBAC? A: Each user’s security clearance needs to be finalized. B: The roles users have on the system need to be clearly defined. C: User’s data need to be clearly labeled. D: Users must be segregated from one another on the IT system to prevent spillage of sensitive data.
B: The roles users have on the system need to be clearly defined.
305
What access control method weighs additional factors such as time of attempted access before granting access? A: Content-dependent access control B: Context-dependent access control C: Role-based access control D: Task-based access control
B: Context-dependent access control
306
An attacker sees a building is protected by security guards, and attacks a building next door with no security guards. What control combination are the security guards? A: Physical / Compensating B: Physical / Detective C: Physical / Deterrent D: Physical/Preventative
C: Physical / Deterrent
307
A Type II biometric is also known as A: Crossover Error Rate (CER) B: Equal Error Rate (EER) C: False Accept Rate (FAR) D: False Reject Rate (FRR)
C: False Accept Rate (FAR)
308
With Kerberos, which part is the single point of failure? A: The Ticket Granting Ticket B: The realm C: The Key Distribution Center D: The Client-Server session key
C: The Key Distribution Center
309
Scenario: Your company has hired a third-party company to conduct a penetration test. Your CIO would like to know if exploitation of critical business systems is possible. The two requirements the company has are 1: The tests will be conducted on live, business functional, networks. These networks must be functional in order for the business to run and cannot be shutdown, even for an evaluation. 2: The company wants the most in-depth test possible. What kind of test should be recommended? A: Zero Knowledge B: Partial Knowledge C: Full Knowledge D: Vulnerability Testing
C: Full Knowledge
310
Scenario: Your company has hired a third-party company to conduct a penetration test. Your CIO would like to know if exploitation of critical business systems is possible. The two requirements the company has are 1: The tests will be conducted on live, business functional, networks. These networks must be functional in order for the business to run and cannot be shutdown, even for an evaluation. 2: The company wants the most in-depth test possible. While conducting a penetration test, the tester discovers a critical business system is currently compromised. What should the tester do? A: Note the results in the pen testing report. B: Immediately end the pen test and call the CIO C: remove the malware D: Shut the system down.
B: Immediately end the pen test and call the CIO
311
A policy that states a user must have a business requirement to view data before attempting to do so is an example of enforcing what? A: Least privilege B: Kneed to know C: Rotation of duties D: Separation of duties
B: Kneed to know
312
What technique could raise the False Accept Rate (FAR) and lower the False Reject Rate (FRR) in a fingerprint scanning system? A: Decrease the amount of minutiae that is verified. B: Increase the amount of minutiae that is verified. C: Lengthen the enrollment time D: Lower the throughput time
A: Decrease the amount of minutiae that is verified.