Domains Flashcards

1
Q

OSI model layers

A
Application
Presentation
Session
Transport
Network
Data link
Physical

Please do not take me to the SPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The security triad

A

Confidentiality
Integrity
Availability
Soon to add safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Objective of privacy

A

Confidentiality of personal data

PII is name addresses ssn financial and medical info traditionally.

Legally more broad:
Race marital status religion political other unique personal identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity ensure

A

Unauthorized users or processes can’t modify data

Authorized users or processes can’t make unauthorized modifications to data

Data is consistent internally no externally so output is expected from input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats to availability

A
Dos
Single point of failure
Inadequate capacity (storage bandwidth processing
Planning 
Equipment malfunctions 
Failsafe control mechanisms 
Disasters 
Business interruptions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the organization mission statement vs organization strategy

A

Mission statement is the reason the organization exists.
Easy to understand
Explains what the org is, does, why it exists and doing what it does in the way it’s doing it

Strategy is how it accomplishes the organization’s mission and will frequently change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Goal vs objective

A

Objective is short term and supports a goal (intermediate term) which supports a mission (long term).

OGM

Follow the strategy though

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the three way handshake

A

SYN
SYN/ACK
ACK

goodbye is:
FIN/ACK
FIN/ACK
ACK

TCP flags manage communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What layers are not covered much in the exam

A

Layers 5 & 6

Presentation and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name ports of the following: and tcp or udp

FTP
HTTP
TELNET 
DNS
NTP
SMTP
HTTPS
LDAP
LDAPS
POP
IMAP
SFTP
A
Name ports of the following:
FTP 21 tcp
HTTP 80 tcp
TELNET 23 tcp
DNS 53 tcp udp
NTP 123 network time protocol UDP
SMTP 25 tcp
HTTPS 443
LDAP 389 tcp udp
LDAPS 636 tcp udp
POP 110 tcp
IMAP 143 tcp
SFTP 990 tcp

Table 1
Common TCP/IP Protocols and Ports
Protocol

TCP/UDP

Port Number

Description

File Transfer Protocol (FTP)

(RFC 959)

TCP

20/21

FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.

Secure Shell (SSH)

(RFC 4250-4256)

TCP

22

SSH is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet which does not support secure connections.

Telnet

(RFC 854)

TCP

23

Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.

Simple Mail Transfer Protocol (SMTP)

(RFC 5321)

TCP

25

SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.

Domain Name System (DNS)

(RFC 1034-1035)

TCP/UDP

53

The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). These different TLD managers then contain information for the second level domains that are typically used by individual users (for example, cisco.com). A DNS server can also be set up within a private network to private naming services between the hosts of the internal network without being part of the global system.

Dynamic Host Configuration Protocol (DHCP)

(RFC 2131)

UDP

67/68

DHCP is used on networks that do not use static IP address assignment (almost all of them). A DHCP server can be set up by an administrator or engineer with a poll of addresses that are available for assignment. When a client device is turned on it can request an IP address from the local DHCP server, if there is an available address in the pool it can be assigned to the device. This assignment is not permanent and expires at a configurable interval; if an address renewal is not requested and the lease expires the address will be put back into the poll for assignment.

Trivial File Transfer Protocol (TFTP)

(RFC 1350)

UDP

69

TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP it has no way of ensuring the file has been properly transferred, the end device must be able to check the file to ensure proper transfer. TFTP is typically used by devices to upgrade software and firmware; this includes Cisco and other network vendors’ equipment.

Hypertext Transfer Protocol (HTTP)

(RFC 2616)

TCP

80

HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and is thus used by any client that uses files located on these servers.

Post Office Protocol (POP) version 3

(RFC 1939)

TCP

110

POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.

Network Time Protocol (NTP)

(RFC 5905)

UDP

123

One of the most overlooked protocols is NTP. NTP is used to synchronize the devices on the Internet. Even most modern operating systems support NTP as a basis for keeping an accurate clock. The use of NTP is vital on networking systems as it provides an ability to easily interrelate troubles from one device to another as the clocks are precisely accurate.

NetBIOS

(RFC 1001-1002)

TCP/UDP

137/138/139

NetBIOS itself is not a protocol but is typically used in combination with IP with the NetBIOS over TCP/IP (NBT) protocol. NBT has long been the central protocol used to interconnect Microsoft Windows machines.

Internet Message Access Protocol (IMAP)

(RFC 3501)

TCP

143

IMAP version3 is the second of the main protocols used to retrieve mail from a server. While POP has wider support, IMAP supports a wider array of remote mailbox operations which can be helpful to users.

Simple Network Management Protocol (SNMP)

(RFC 1901-1908, 3411-3418)

TCP/UDP

161/162

SNMP is used by network administrators as a method of network management. SNMP has a number of different abilities including the ability to monitor, configure and control network devices. SNMP traps can also be configured on network devices to notify a central server when specific actions are occurring. Typically, these are configured to be used when an alerting condition is happening. In this situation, the device will send a trap to network management stating that an event has occurred and that the device should be looked at further for a source to the event.

Border Gateway Protocol (BGP)

(RFC 4271)

TCP

179

BGP version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet.

Lightweight Directory Access Protocol (LDAP)

(RFC 4510)

TCP/UDP

389

LDAP provides a mechanism of accessing and maintaining distributed directory information. LDAP is based on the ITU-T X.500 standard but has been simplified and altered to work over TCP/IP networks.

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

(RFC 2818)

TCP

443

HTTPS is used in conjunction with HTTP to provide the same services but doing it using a secure connection which is provided by either SSL or TLS.

Lightweight Directory Access Protocol over TLS/SSL (LDAPS)

(RFC 4513)

TCP/UDP

636

Just like HTTPS, LDAPS provides the same function as LDAP but over a secure connection which is provided by either SSL or TLS.

FTP over TLS/SSL

(RFC 4217)

TCP

989/990

Again, just like the previous two entries, FTP over TLS/SSL uses the FTP protocol which is then secured using either SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Name services of the following:
21
80
23
53 
123 network time protocol UDP
25
443
A
Name services of the following:
FTP 21
HTTP 80
TELNET 23
DNS 53 
NTP 123 network time protocol UDP
SMTP 25
HTTPS 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Senior level management is responsible for:

A

Information owner

Leading by example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

End user or user responsibilities include:

A

Complying with security requirements in policies standards procedures; contractual requirements (NDAs, SLAs); legislation regulations

Participating in info section training, awareness

Due care in protecting info and information assets

Reporting suspicious activity, violations problems, concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an org fails to follow standard of due care in protection of assets, the organization may be held:

A

Culpubly negligent. Insurance won’t cover all loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two purposes for criminal penalties and name two criminal law classifications

A

Criminal penalties have two purposes
Punishment and deterrence

Two classifications
Felony
Misdemeanour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Difference between due care and due diligence

A

Due care: turn on logging

Due diligence: prudent management of due care so regularly reviewing logs

17
Q

How long does copyright protection last if you are
A) the author and
B) a corporation

A

Author : lifetime plus 70 years

Corp: 75 years

18
Q

What are the two limitations on copyright?

A

First sale : you can sell your copy of the work

Fair use: you can make a copy for yourself (many devices for example)

19
Q

What do inventors have for protection of their inventions?

A

Patent- 20 years from idea and development

This is the strongest form of protection

PTC is the international Patent Cooperation Treaty adopted by over 130 countries

Owner pursues patent rights to protect. There is no organization to enforce patents.

20
Q

Name attacks on IP… 5

A
Piracy
Copyright infringement 
Counterfeiting
Cyber squatting (buy a URL that you need)
Typosquatting (buy a URL with a typo)
21
Q

What is WIPO?

A

Run by the UN is main international World Intellectual Property Organization

22
Q

What does the Wassenaar do?

A

Th Wassenaar agreement (still in place) makes it illegal to export munitions to terrorist states. Software with more than 40 bit encryption was considered to be munitions.

23
Q

What are the 3 entities that HIPAA applies to?

A

Health insurers
Health providers
Health care clearing houses (claim processing agencies) outsourced but doesn’t absolve of liability

24
Q

Name the four categories of disruptions?

A

Non-disasters inconveniences (hard drive failure)

Emergency: potential loss of life or property (anyone can declare)

Disaster: entire facility unusable for a dy or more (snowstorm and notification must go out to all) has to be declared by BC coordinator or senior management

Catastrophe: destroys facility