Domain 5 Flashcards

1
Q

First step to IT security

A

Baseline security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 types of power failure

A

1) blackout
2) brownout
3) sags, spikes, surges
4) EMI (electromagnetic interference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fire suppression systems not safe for human life

A

-Halon systems
-Carbon dioxide

Can use:

-argonite
-FM-200 (preferred)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mandatory access controls (MACs)

A

Logical access control filters used to validate access credentials that can’t be controlled/modified by normal users or data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary access controls (DACs)

A

Controls that may be configured or modified but the users or data owners

*DACs should be aligned with MACs to be effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

An authentication service that validates services and users in a DCE (distributed computing environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service (DoS)

A

Remote users may not be able to access data/apps vital to carry out day to day business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1st step in implementing logical access controls

A

Prepare an inventory of IS resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most effective control against identity theft

A

Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication (3)

A

-something you know (password)
-something you have (token card)
-something you are/do (biometric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 steps to implement logical access controls

A

1) inventory of IS resources
2) classify IS resources
3) perform grouping/labeling of IS resources
4) create access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default deny access

A

Allows approved traffic and rejects all other traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Default allow access

A

Denies specific traffic and allows all other traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False rejection rate
(FRR or type-1error rate)

A

of times an individual w/ authority to use the system is falsely rejected by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Failure to enroll rate (FER)

A

Proportion of openly who fail to be enrolled successfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

False acceptance rate
(FAR or type-2 error rate)

A

of times an individual NOT granted authority to use the system is falsely accepted by the system

  • best performance indicator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cross error/equal error rate
(CER/EER)

A

Rate at which FAR and FRR are equal
-lowest is the most effective
-overall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Biometric attacks

A

Replay
Brute force
Cryptographic
Mimic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Replay (biometric attack)

A

Residual biometric characteristic is used by attacker to gain access (ex fingerprint left on device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Brute force (biometric attack)

A

Sending numerous different biometric samples to a biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cryptographic (biometric attack)

A

Targets algorithm or encrypted data transmitted between biometric device and access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Mimic (biometric attack)

A

Attacker attempts to fake the biometric characteristics similar to those of the enrolled user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What has the highest reliability and lowest FAR

A

Retina/iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Biometric life cycle

A

1) enrollment
2) transmission & storage
3) verification
4) identification/termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Dedicated circuit

A

Symmetric telecommunication line connecting 2 locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Switched circuit

A

Does not permanently connect 2 locations, be set up on demand:

Circuit switching (telephone network)
Packet switching (lower cost)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

7 layers to OSI architecture

A
  1. Physical (Please)
  2. Data link layer (Do)
  3. Network layer (Not)
  4. Transport layer (Teach)
  5. Session layer (Stupid)
  6. Presentation layer (People)
  7. Application layer (Anything)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Physical layer
A

Relates to electrical signal or hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. Data link layer
A

Relates to MAC address or bit conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Network layer
A

Relates to routing or IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Transport layer
A

Related to
-reliable delivery
-connection oriented
-delivery in proper order
-congestion control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Session layer
A

Relates to managing connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. Presentation layer
A

Converts data into presentable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. Application layer
A

Relates to end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

LAN components

A
  1. Hub & repeater (dumb device)
  2. Switch & bridge (more capable)
  3. Router (most capable - layer 3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Layer-2-switches

A

Devices that can divide and interconnect network segments & help to reduce collision in domains in Ethernet based networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Fiber optics

A

Most secure mode of data transmission

38
Q

Shielded twisted pair (STP)=

A

Less crosstalk

39
Q

Unshielded twisted pair (UTP)=

A

More crosstalk
Higher attenuation

40
Q

Attenuation

A

Wired or wireless - the weakening of signals during transmission

(Impacted by length of wire)

41
Q

Crosstalk

A

Electromagnet interference from one UTP to another twisted pair, normally running in parallel (only wired)

42
Q

EMI (electromagnetic interference)

A

Disturbance generated by an external source that affects an electrical circuit

43
Q

DHCP (dynamic host configuration protocol)

A

Protocol to manage network configuration by assigning an IP address & other parameters to every device on a network so they can communicate with other IP networks

RISK- access to network port is not restricted

44
Q

Secure shell (SSH)

A

protocol that uses cryptography to secure encrypted communication, remote login/execution between 2 networked computers or data in transmission

-cannot encrypt data at rest (like on USB drives)

45
Q

Latency

A

The delay that a message or packet will experience on its way from source to destination

46
Q

Middleware

A

Software employed by Client server applications

47
Q

Firewalls (3)

A
  1. Packet filtering router
  2. Stateful inspection
  3. a.application level
    b.circuit level
48
Q

Bastion host

A

Only host computer that a company allows to be addressed directly from the public network and is designed to protect the rest of its network from exposure

-heavily forfeited against attack

49
Q

Proxy server

A

Stands between internal and external network & will not allow direct communication between 2 networks
(Circuit or application level firewall)

50
Q

Packet filtering - firewall

A

-simplest
-network layer (3)
-examines header or every packet of data traveling between internet and corporate network

51
Q

Stateful inspection - firewall

A

-keeps track of destination of each packet that leaves internal network & ensures incoming message matches IP address
-complex
-network layer

52
Q

A.Application/B.circuit layer- firewall

A

A. Application layer (7)/most secured
-works on concept of bastion host & proxy servers separate for each application

B. Session layer (5); works on bastion host and proxy server too but same proxy for all services

53
Q

Firewall implementations (3)

A

Dual homed
Screened host
DMZ / screened subset

54
Q

Screened host

A

-Uses packet filtering router firewall and bastion host
-implements basic network layer security and application server security

55
Q

Dual homed

A

-uses packet filtering router firewall and bastion host but with 2 NIC (network interface cards)
-more restrictive
-acts to block or filter some or all traffic trying to pass between networks

56
Q

DMZ (demilitarized)/Screened subset

A

-Most secure
-uses 2 packet filtering routers and 1 bastion host
-limits supervised available to use
-supports network&application level security while defining a separate DMZ network

57
Q

Shadow IT

A

IT app, took, service, or system used for various purposes but is NOT reviewed/tested/approved

58
Q

Symmetric encryption

A

-Single key is used to encrypt/decrypt
-faster
-inexpensive

59
Q

Asymmetric encryption

A

-2 keys: private & public
-slower
-expensive
-more security tho for sharing

60
Q

Asymmetric encryption - ensure confidentiality

A

Encrypt using receivers Public key
Decrypt using receivers private key

61
Q

Asymmetric encryption - ensure authenticity & integrity

A

Create a hash of the message and encrypt using senders private key

62
Q

Defense-in-depth

A

Security arrangement includes the use of multiple security mechanisms that support & complement each other

-centralized firewalls + logical access controls

63
Q

Secure socket layer (SSL)

A

Uses cryptographic functions to protect the confidentiality, reliability, and integrity of private data traveling through the internet

64
Q

SBC

A

Session border controllers - deployed to protect VoIP networks & DoS/DDoS attacks
-prevents fraud
-encrypts signals
-provides quality of service

65
Q

DDoS

A

Distributed denial of service - attack aims to bring down VoIP infrastructure by flooding with heavy traffic from multiple sources

66
Q

PBX (private branch exchange)

A

Computer based switch/basically an in house phone company for org
-protection of PBX is high priority

67
Q

Segregation of VoIP infrastructure using VLAN ensures

A

Security and reliability

68
Q

Address resolution protocol (ARP)

A

Communication protocol used to map IP and MAC addresses

-data traffic in VoIP can be eavesdropped by corrupting ARP

69
Q

Digital signature ensures

A

(Email) authenticity

70
Q

War driving

A

Used by hackers in wireless networks
-most relevant technique to test the security of an orgs WiFi

71
Q

Botnets

A

Zombie computers/used to run malicious software for DDoS attacks

72
Q

Buffer overflow

A

Common software coding mistake;
more data in a buffer than can handle and overflows to adjacent storage

73
Q

Data diddling

A

No preventative controls

Data is altered as it entered a computer system

74
Q

Man in the middle attack

A

Attacker interferes while 2 devices are establishing a connection

-avoids 2 factor authentication

75
Q

Spoofing

A

Appearing to originate from an internal source

76
Q

IDS (intrusion detection systems) components

A

Sensor - collects data
Analyzer
User interface
Admin console

77
Q

Where should the IDS be located in a network

A

Between the firewall and the orgs internal network

78
Q

Statistical based IDS generates the most

A

False positives

79
Q

Neural network IDS

A

Creates database & is most effective in detecting fraud

80
Q

Honeypot

A

Software application, that pretends to be a vulnerable server on the Internet, and is not set up to actively protect against break-ins, so it acts as a decoy system that lures hackers 

81
Q

IDS limitations

A
  1. Will not be able to detect application level vulnerabilities.
  2. Back doors into applications
  3. IDS will not be able to detect encrypted traffic
82
Q

Programmers should not have access to the

A

Production database

83
Q

Hash values ensure data has

A

Not been changed during transmission

84
Q

Data mining

A

Technique used to detect trends or patterns of transactions or data

85
Q

Storage devices (usb) can be a vehicle for

A

Infecting other computers with malware

86
Q

Advanced encryption standard (AES) provides

A

Strongest encryption and greatest assurance that data is protected

87
Q

Steganography

A

-Technique for concealing the existence of messages or information
-digital water marking
-hides date within data

88
Q

Digital signatures provide

A

Integrity

89
Q

Message digest

A

Calculated & included in a digital signature to prove the message hasn’t been altered

90
Q

Encapsulation or tunneling

A

Technique used to encrypt the traffic payload so that it can be securely transmitted over an insecure network

91
Q

For confidentiality and authenticity; sign a message using

A

The senders private key &
Encrypt using receivers public key