Mod 2 Flashcards

(28 cards)

1
Q

Define physical security

A

A physical object creating a barrier to unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define destructive entry

A

Using force to defeat physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define nondestructive entry

A

Compromising security without leaving signs of a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Though not the only point of attack, this system manages a computer’s resources and tends to be the focal point of security, and attacks.

A

the Operating System (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of an Access Control Entry (ACE)?

A

to allow/deny a type of access to a file/folder by a user/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Access Control List (ACL)?

A

the set of ACEs for a file/folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Access Control Model

A

an Access Control Model is a framework that defines how permissions and access to resources are granted or restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of Access Control Models?

A

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary difference between DAC and MAC models?

A

In DAC, users set permissions over the resources they own.
In MAC, users are unable to allow/deny permissions on resources they own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 1st and 2nd part of file access control?

A

1st: Access Control Model
2nd: Closed/Open Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the key difference between Open and Closed policies?

A

In a closed policy, an actor must explicitly possess the right to do an action.
I.E: Can’t do it unless it says you can.

In an open policy, an actor is assumed to be able to do all actions, unless a rule explicitly denies it.
I.E: You can do it unless it says you can’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define injection attacks

A

malicious code is injected into safe code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attacks are Unix Shell attacks?

A

Injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a Unix Shell attack work?

A

The Unix shell enables a command argment to be obtained from the output of a different command. This is known as command substitution. While parsing the command line, the Unix shell replaces the output of a command between back quotes ( ‘ ‘ ) with the output of a different command.

For example, assume the command print name.txt prints Taylor, and the command find * searches for names. The command find ‘print name.txt’ would effectively equal: find Taylor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of architecture is used for modern operating systems?

A

microkernal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What 4 criteria must biometric indentification traits follow?

A

Universality - almost everyone has it
Distinctiveness - each person’s slightly different
Permanence - it shouldn’t change significantly over time
Collectability - it should be effectively dtermined and quantifiable

17
Q

Define Dictionary Attack

A

each word in a dictionary is hashed and the resulting value is compared with hashed passwords

18
Q

Define password salt

A

a random string of data attached before or after a password before it is hashed

19
Q

Define 2 factor authentication (2FA)

A

authentication that uses 2 of the 3 factors of authentication
- something you have
- something you know
- something you are

20
Q

Define spoofing

A

pretending to be someone else

21
Q

What’s the purpose of the address resolution protocol (ARP)?

A

It connects the network to the data layer by converting IP addresses to MAC addresses. This takes place between the network and link layers.

22
Q

What layer do Denial of Service Attacks happen?

A

Network (IP) Layer

23
Q

How do Denial of Service attacks work?

A

large number of packets are sent to a client, which either slows down or crashes the client trying to process them

24
Q

What’s an IP spoofing attack?

A

an attempt by an attacker to send packets from a fake IP address they’re pretending to be

25
What are the two approaches to creating firewall policies?
Blacklist Whitelist
26
What's the key difference between Blacklist and Whitelist policies?
In a blacklist approach, all packets are allowed through unless specifically exempted. I.E: a ban list In a whitelist approach, no packets are allowed through unless specifically allowed. I.E: a guest list
27
Define Port Knocking
a brute force attack where an attacker tries to allocate network connections to gain access to a host
28
(T/F). The best approach to designing and implementing network security is to address one layer of the network protocol stack at a time completely, as attacks are designed at a particular layer.
False