Memorization Flashcards

1
Q

4th Amendment

A

Basis for privacy rights in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALE

A

Annualized Loss Expectancy
(Cost of losses per year)

SLE x ARO
(Single Loss Expectancy X Annual Rate of Occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARO

A

Annual Rate of Occurence

Number of Losses per Year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EF

A

Exposure Factor

Percentage of Asset Value Lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SLE

A

Single Loss Expectancy
(Cost of One Loss)

AV x EF
(Asset Value X Exposure Factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Formula

A

Threat X Vulnerability

multiplied by Impact sometimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECPA

A

Electronic Communications Privacy Act

Prohibits eavesdropping or interception without distinguishing private/public.

Protects from warrant-less wiretapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OECD

A

Organization for Economic Cooperation and Development

Provides for data collection, specifications, and safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1974 US Data Privacy Act

A

Protection of PII on Federal databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GLBA

A

Gramm-Leach-Bliley Act

Credit related PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISC2 Code of Ethics Canons

A
  1. Protect society, the commonwealth, and the infrastructure.
  2. Act honorably, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EU Data Protection Directive

A

Notify individuals how personal data is collected and used.

Allow Individuals to opt out of sharing data with 3rd parties.

Require individuals to opt into sharing most sensitive personal data.

Providing reasonable protections for personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO 27005

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA Triangle

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAAA

A

4 Key Principles of Access Control

Identification
Authentication
Authorization
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Private Sector Classification Labels

A

Public - used by public or employees
Private - EX. SSN, CC# (could cause damage)
Confidential - Cause exceptionally grave damage
Proprietary - trade secrets
Sensitive - internal business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Government Classification Labels

A

Confidential - Some Damage
Secret - Serious Damage
Top Secret - Grave Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NIST 800-14

A

Securing IT Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NIST 800-88

A

Guidelines for sanitization and disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIST 800-122

A

PII Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NIST 800-145

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

International Safe Harbor Tenets

A
  1. Notice
  2. Choice
  3. Onward Transfer
  4. Security
  5. Data Integrity
  6. Access
  7. Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

International Common Criteria

A

EAL1: Functionally Tested
EAL2: Structurally Tested
EAL3: Methodically tested and checked
EAL4: Methodically designed, tested, and received
EAL5: Semi-formally designed and tested
EAL6: Semi-formally verified, designed, and tested
EAL7: Formally verified, designed, and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

3 Digital Signature Standards

A

DSA - Digital Signature Algorith
RSA - Rivest-Shamir-Adleman cryptosystem
ECDSA - Eliptical Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fire Type Code A

A

Ash: Wood or Paper

Suppression Agent = Water or Soda Acid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fire Type Code B

A

Boils: Gas or Oils

Suppression Agent = Halon, CO2, Soda Acid (NEVER WATER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Fire Type Code C

A

Current: Electrical Equipment

Suppression Agent = Halon, CO2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fire Type Code D

A

Ding Ding: Metal

Suppression Agent = Dry Powder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Fire Type Code K

A

Kitchen: Oil or Fat

Suppression Agent = Wet Chemicals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Sag

A

Temporary Low Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Spike

A

Temporary High Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Surge

A

Prolonged High Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fault

A

Short Loss of Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Brownout

A

Prolonged Low Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Blackout

A

Prolonged Loss of Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Physical Gate Classes

A

I : Residential (home use)
II : Commercial/General (parking garage)
III : Industrial/Limited Access (loading docks)
IV : Restricted Access (Airport or Prison)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Asymmetric Algorithms

A
RSA
DSA
ECC
El Gamal
Diffie-Hellman
Knapsack
39
Q

Symmetric Algorithms

A
DES
3DES
AES
IDEA
Blowfish
Twofish
RC4
SAFER
40
Q

Biba Model

A

Information Flow Model
Focused on INTEGRITY!

Simple Integrity Axiom = No Read Down
* Integrity Axiom = No Write Up

41
Q

Bell-Lapadula Model

A

Information Flow Model
Focused on CONFIDENTIALITY!

Simple Security Property = No Read Up
* Security Property = No Write Down

42
Q

Clark-Wilson Model

A

INTEGRITY Model

Access to objects only through programs

Don’t touch my shit! Untrusted users aren’t allowed to have access to resources without going through a protected application.

43
Q

Graham-Denning Model

A

Focuses on relationship between subjects and objects.

44
Q

The Ring Model

A

Ring 0 = Kernel
Ring 1 = Other OS components
Ring 2 = Device Drivers
Ring 3 = User Applications

45
Q

Generic Security Architecture Layers

A
  1. Hardware
  2. Kernel and Device Drivers
  3. OS
  4. Applications
46
Q

EAP

A

Extensible Authentication Protocol

Authentication at Layer 2

47
Q

LEAP

A

Significant flaws, should not be used

48
Q

EAP-TLS

A

Very secure but complex and costly
Uses PKI
Secure Tunnel
Server and client certificate

49
Q

EAP-TTLS

A

Simplified EAP-TLS
Drops client side cert
Cheaper and less secure

50
Q

PEAP

A

Protected EAP

Competitor to TTLS

51
Q

TCP 20-21

A

FTP

52
Q

TCP 22

A

SSH (SFTP)

53
Q

TCP 23

A

Telnet

54
Q

TCP 25

A

SMTP

55
Q

TCP/UDP 53

A

DNS

56
Q

UDP 67-68

A

DHCP / BOOTP

57
Q

TCP 80

A

HTTP

58
Q

TCP 143

A

IMAP

59
Q

TCP/UDP 389

A

LDAP

60
Q

TCP 636

A

LDAP over SSL or TLS

61
Q

UDP 69

A

TFTP

62
Q

TCP 443

A

HTTPS

63
Q

TCP 445

A

AD

64
Q

TCP 1433-1434

A

Microsoft SQL

65
Q

TCP 3389

A

RDP (Microsoft Terminal Services)

66
Q

TCP 137
TCP 138
UDP 139

A

NetBIOS

67
Q

Circuit Level Firewall

A

Layer 5 (Short Circuit - Johnny 5)

Monitor TCP Handshakes

68
Q

Stateful Inspection Firewall

A

Layer 5 (5tateful)

Have access to conversation, state table, context of packets

3rd Generation

69
Q

Static Packet Filtering Firewall

A

Layer 3 (Static Pack3t)

Simple and fast
Rules based on packet source, destination, port, etc.

1st Generation

70
Q

Kernel Proxy / Application Firewall

A

Layer 7

Control AD; Uses dynamic TCP/IP stacks to inspect network packages

5th Generation

71
Q

PAP

A

Password Authentication Protocol

Sends Password unencrypted

72
Q

CHAP

A

Challenge Handshake Authentication Protocol

Used by PPP servers to authenticate remote clients

Encrypts username and password and re-authenticates periodically.

73
Q

OSI : Application Layer

A

Layer 7

Applications: Web Browser, messaging apps, word processing

Protocols: FTP, SNMP, Telnet, SMTP, HTTPS, SSL, SCP

74
Q

OS : Presentation Layer

A

Layer 6

Data Conversion and character sets

Translations: ANSI, ASCII
Standards: JPEG, TIFF, MID, HTML, GIF

75
Q

OSI : Session Layer

A

Layer 5

“Connections between applications”

Protocols: NFS, SQL, RADIUS, PPTP, RPC

76
Q

OSI : Transport Layer

A

Layer 4

Packet Sequencing, flow control, error detection

Protocols: TCP, UDP, SSL, SSH-2

77
Q

TCP 3 Way Handshake

A

SYN, SYN/ACK, ACK

78
Q

OSI : Network Layer

A

Layer 3

Logical/Network Addressing
Routing: Moving data from, a system on one LAN to a system on another LAN.
IP Addresses and Routers

Protocols: IPv4, IPv6, IPsec, ICMP, BOOTP, DHCP

79
Q

OSI : Data Link Layer

A

Layer 2

Access to physical layer and LAN communication
Data frames
Ethernet cards, switches, bridges (Hardware addressing)

2 Sub layers (Media Access Control[MAC] and Logical Link Control[LLC])

Protocols: PPTP, L2TP, ARP, CHAP

80
Q

OSI: Physical Layer

A

Layer 1

Physical Signaling: bits in voltages or light impulses
Electrical, hardware, and software drivers
Hubs, cables, USB, DSL, ISDN

Physical topologies: BUS, MESH, STAR, TREEE

81
Q

OSI Model Layers

A

All People Seem To Need Data Processing

  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
82
Q

TCP/IP Model Layers

A

AHIN - (3-1-1-2)

Application (3)
Host to Host (1)
Internet (1)
Network Access (2)

83
Q

Most Common VPN Protocols

A

PPTP
L2F
L2TP
IPsec

84
Q

3 Factors of Authentication

A
  1. Something you know
  2. Something you have
  3. Something you are
85
Q

Disaster Recovery Tape Rotation Strategies

A

Tower of Hanoi
Grandfather, Father, Son
First In, First Out
Six Cartridge Weekly

86
Q

Incident Response Lifecycle

A
  1. Preparation
  2. Detection (aka identification)
  3. Response (aka containment)
  4. Mitigation (aka eradication)
  5. Reporting
  6. Recovery
  7. Remediation
  8. Lessons Learned
87
Q

RAID 6

A

3 Disk Minimum

Block level striping with double distributed parity

2 drive loss acceptable

88
Q

RAID 4

A

3 Disks Minimum

Block Level striping with dedicated parity

89
Q

RAID 5

A

3 Disks Minimum

Block level striping with distributed parity
Hot Swappable

1 Drive loss acceptable

90
Q

RAID 3

A

3 Disks Minimum

Byte Level Striping with dedicated parity
Parity drive is SPOF

91
Q

RAID 1

A

2 Disks Minimum

Mirrored Set
Fault tolerance from single disk failure; expensive

Redundancy only, not speed

92
Q

RAID 0

A

2 Disks Minimum

Striped

Improved performance but no fault tolerance

93
Q

CMM

A

Software Capability Maturity Model

  1. Initiating
  2. Repeatable
  3. Defined
  4. Managed
  5. Optimizing