Missed Test Questions Flashcards
(270 cards)
3 Media Management / Control modes
- Simplex (one direction)
- Half-duplex (two way, but only one direction can send data at a time)
- Full-duplex (two way, in which data can be sent in both directions simultaneously)
Atomicity
Database principle that ensures transactions execute in an all or nothing fashion
First Thing a BCP Team should do
Business organization analysis
Best choice for an org that wants to enforce strong passwords, with most users having a single set of credentials
Single Sign On (SSO) - A mechanism that allows users to authenticate themselves only once and freely roam the network / access resources without having to be reauthenticated.
Disaster Recovery Plan
Full Interruption type of test
Test phase where the primary data center is shut down
Best choice for admin installing and app on a Windows server. The app needs to run in the context of an account with specific privileges.
Service Account
End-of-Service (EOS) vs. End-of-Life (EOL)
EOS - when a vendor will no longer support a product
EOL - when a vendor will no longer off a product for sale
Watermarking Digital Data
Method to embed unobtrusive labels in digital data. After they are embedded, other methods should be able to detect these labels
The process of digital watermarking hides information within a file that
is known only to the file’s creator. If someone later creates an unauthorized copy of the
content, the watermark can be used to detect the copy and (if uniquely watermarked files are
provided to each original recipient) trace the offending copy back to the source.
Why would a company’s security policy state that user accounts should be disabled during the exit interview for any employee leaving the company?
To retain the employee’s decryption key
Under HIPAA when is it permissible to share PHI with a 3rd party vendor?
If the service provider enters into a business associate agreement
Which technologies specifically defined as part of 802.11 wireless networking?
- WPA3
- SAE
- 802.11i
- WPS
Symmetric Encryption Table
AES/Rijndael
(Type, Algo Type, Block Size in bits, Key size in bits, Strength)
Type: Symmetric
Algo Type: Block Cypher
Block Size (bits): 128
Key Size (bits): 128, 192, 256
Strength: SKRONG
Network Controls
Quality of Service
QoS controls allow admins to prioritize different types of network traffic
What is a neccessary requirement for an IT network that ensures accountability?
Audit Trails
Audit trails provide a record of events in audit logs. They include what happened and who did it. Users can be held accountable for their actions when the logs show what they did. Authentication (not available as a possible answer) is also necessary.
Misuse Case Testing
Where you develop a list of possible ways that an attacker may exploit the app and then tries each scenario and seeing if the app is actually vulnerable to that exploit
PCI DSS
Payment Card Industry Data Security Standard
Applies to orgs involved in storing, transmitting, and processing credit card info
Privileged Account Management
Method to identify when personnel are using elevated privileges, and detect violation of the least privilege principle
Privileged account management ensures that personnel do not have more privileges than they need and do not misuse their privileges. It can identify whether users have excessive privileges violating the least privilege principle. Security logs would be used, but not alone.
IPT
Integrated Product Teams (IPTs)
Introduced by DoD in 1995 to bring together stakeholder and foster parallel decision making
Software Configuration Management (SCM)
Configuration Control
Portion of SCM process that ensures changes to software versions are made in accordance with the change control and configuration management policies
While traveling, a worker connects their company-issued computer to a hotel Wi-Fi network, rather than the cellular data service included with the system. After checking email, performing online research, posting a message to a company discussion forum, and updating his itinerary in the company scheduling service, he disconnects. A few days later, the company experiences an intrusion and trade secrets are stolen by an unknown attacker. The incident investigation revealed that the credentials used to gain access to company during the breach belonged to the remote worker. What was the cause of the company compromise?
Not using the 4G or 5G link
The most likely cause of this incident was an acceptable use policy violation of not using the 4G/5G cellular service included on the mobile system. If a company-issued computer has a cellular data service, it is likely there is a prohibition of using open Wi-Fi networks.
ARP poisoning might have been involved in the attack if the adversary was in the same hotel and on the same Wi-Fi network as the victim, but this is not the primary reason the attack occurred.
Social Engineering Attack
Hoax
(3 major indicators)
A hoax is a social engineering attack that is attempting to trick a user into taking actions that will harm them through the use of fear that not taking action would actually cause harm.
- Lack of digital signature
- Threat of damage to computer system
- Encouragement to take specific steps to resolve
Characteristics NOT attributed to Hoax specifically
- Use of poor grammar
- Lack of correct spelling
- Claim to be from trusted authority
- Inclusion of hyperlinks
Benefits of IPv6 vs IPv4
IPv6
- Uses 16 byte address
- Supports autoconfig without DHCP
- Supports QoS priority values
IPv4
- 32-bit address
- reserves a subnet for loopback
- requires NAT to convert between internal and external addresses
- Also supports QoS values, but it is call type of service in the header
East-West Traffic & North-South Traffic
East-West Traffic: Flow that occurs within a specific network, data center, or cloud
North-South Traffic: Flow that occurs inbound or outbound between internal systems and external systems
Type of protocol that replaces certificate revocation lists with a real-time method of verifying the status of a digital certificate?
Online Certificate Status Protocol (OCSP)
Provides real time query / response services to digital cert users. This overcomes the latency inherent in the traditional cert revocation list download and cross check process.