Needs Improvement Flashcards

(105 cards)

1
Q

DES

A

Symmetric
Key Length: 64 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 DES or
TDES
(Triple DES)

A

Symmetric
Key Length 56 bit*3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Symmetric
Key Length: 128,192,256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDEA

A

Symmetric
128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Skipjack

A

Symmetric
80 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blowfish

A

Symmetric
32-448 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TwoFish

A

Symmetric
2048

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4

A

Symmetric
40-2048

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RC5

A

Symmetric
2048

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAST

A

Symmetric
40-128 bit & 128-256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Diffie Hellman

A

Asymmetric
No confidentiality, authentication, or
non-repudiation
* Secure key transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA

A

Asymmetric
4096 bit
Uses 1024 keys
* Public key and one-way function for
encryption and digital signature
verification
* Private key and one-way function for
decryption and digital signature
generation
* Used for encr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elgamal

A

Asymmetric
Any Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Elliptic Curve Cryptosystem (ECC)

A

Asymmetric
Any Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric Algorithms

A

Use a private key which is a secret key between two parties.
Each party needs a unique and separate private key.
Number of keys = x(x-1)/2 where x is the number of users. Eg.
DES, AES, IDEA, Skipjack, Blowfish, Twofish, RC4/5/6, and
CAST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stream Based Symmetric Cipher

A

Encryption done bitwise and use keystream generators Eg.
RC4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Block Symmetric Cipher

A

Encryption done by dividing the message into fixed-length
blocks Eg. IDEA, Blowfish and, RC5/6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Asymmetric Algorithms

A

Use public and private key where both parties know the public
and the private key known by the owner .Public key encrypts
the message, and private key decrypts the message. 2x is total
number of keys where x is number of users. Eg. Diffie-Hellman,
RSA, El Gamal, ECC, Knapsack, DSA, and Zero Knowledge
Proof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical (1)

A

Electrical signal : Bits to voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Link Layer (2)

A

PPP - PPTP - L2TP - - ARP -
RARP - SNAP - CHAP - LCP -
MLP - Frame Relay - HDLC -
ISL - MAC - Ethernet - Token
Ring - FDDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network
layer (3)

A

CMP - BGP - OSPF - RIP - IP -
BOOTP - DHCP - ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Transport (4)

A

TCP - UDP datagrams. Reliable end to end data
transfer -Segmentation - sequencing - and error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Session (5)

A

TCP - UDP - NSF - SQL - RADIUS - and RPC - PPTP - PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Presentation (6)

A

TCP - UDP messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Application (7)
TCP - UDP - FTP - TELNET - TFTP - SMTP - HTTP CDP - SMB - SNMP - NNTP - SSL - HTTP/HTTPS.
26
Challenge-Handshake Authentication Protocol (CHAP)
Encrypt username/password and re-authenticate periodically. Use in PPP.
27
Point-to-Point Tunneling Protocol (PPTP)
* PPP for authentication * No support for EAP * Dial in * Connection setup uses plaintext * Data link layer * Single connection per session
28
Layer 2 Tunneling Protocol (L2TP)
* Same as PPTP except more secure * Commonly uses IPsec to secure L2TP packets
29
Internet Protocol Security (IPsec)
* Network layer * Multiple connection per session * Encryption and authentication * Confidentiality and integrity
30
EAP (Extensible Authentication Protocol)
Utilizes PPP and wireless authentication. Compatible with other encryption technologies
31
Discretionary Access Control (DAC)
Uses access control lists (ACLs - Access-control lists).
32
Mandatory Access Control (MAC)
Subject authorize according to security labels. Used by owners to grant or deny access to other users. ACL defines the level of access granted or denied to subjects.
33
Role-BAC (RBAC)
Task-based access controls - subjects require access an object based on its role or assigned tasks.
34
Rule-BAC
Uses a set of rules or filters to define what can or cannot be done on a system.
35
Lattice based / Label
Objects are classified based on control level using a label.
36
Non-discretionary access / Mandatory-Access control
Based on policies defined by a central authority. Role based or task based.
37
Kerberos
Client /server model authentication protocol. * Symmetric Key Cryptography * Key Distribution Center (KDC) * Confidentiality and integrity and authentication, symmetric key cryptography
38
The Kerberos logon process
* User input username/password in client PC/Device. * Client system encrypts credentials using AES to submit for KDC. * KDC match input credentials against database. * KDC create a symmetric key and time-stamped TGT to be used by the client and the Kerberos server. * Key and TGT are encrypted using client password hash. * Client installs the TGT and decrypts the symmetric key using a hash.
39
Risk Management
the process of identifying, examining, measuring, mitigating, or transferring risk
40
Preventative Risk Management
Security Policies Security Cameras Callback Security Awareness Training Job Rotation Encryption Data Classification Smart Cards
41
Deterrent Risk Management
Security Personnel Guards Security Cameras Separation of Duties Intrusion Alarms Awareness Training Firewalls Encryption
42
Detective Risk Management
Logs Security Cameras IDS Honey Pots Audit Trails Mandatory Vacations
43
Corrective Risk Management
Alarms Antivirus Solutions IDS BCP
44
Recovery Risk Management
Backups Server Clustering Fault Tolerant Drive Systems Database Shadowing Antivirus Software
45
NIST SP 800 Series
Computer Security in a variety of areas
46
800-14 NIST SP
Securing Information Technology systems
47
800-18 NIST
Develop security plans
48
800-27 NIST SP
Baseline for achieving security
49
800-88 NIST
Guidelines for sanitation and disposition, prevents data remanence
50
800-137
Continuous monitoring program: define, establish, implement, analyze and report
51
800-145
Cloud Computing standards
52
FIPS
Federal Information Processing Standards
53
Sniffing
Unauthorized monitoring of transmitted data
54
Session Hijacking
Monitor and capture of authentication sessions with the purpose of finding and hijacking credentials
55
Incident Response steps
1. Detect 2. Respond 3. Report 4. Recover 5. Remediate 6. Review
56
Port 20, 21
FTP File Transfer Protocol
57
Port 22
SSH Secure Shell
58
Port 23
Telnet
59
Port 25
SMTP Simple Mail Transfer Protocol
60
53
DNS
61
110
POP3 Post Office Protocol
62
80
HTTP Hypertext Transfer Protocol
63
143
IMAP Internet Message Access Protocol
64
389
LDAP Lightweight Directory Access Protocol
65
443
HTTPS Hypertext Transfer Protocol Secure
66
636
Secure LDAP Lightweight Directory Access Protocol
67
445
ACTIVE Directory
68
1433
Microsoft SQL
69
3389
RDP Remote Desktop Protocol
70
137-139
NETBIOS
71
Due Dilligence
establishing a plan, policy, and process to protect the interests of an organization
72
Due Care
Practicing the individual activities that maintain the due diligence effort
73
Asset
Anything of Value to the company
74
Vulnerability
A weakness: the absence of a safeguard
75
Threat
Things that could pose a risk to all or part of an asset
76
Threat Agent
The entity which carries out the attack
77
Exploit
an instance of compromise
78
Risk
The probability of a threat materializing
79
SDN Software Defined Networking
Decoupling the network control and the forwarding functions. Features -Agility, Central management, Programmatic configuration, Vendor neutrality.
80
Fibre Channel over Ethernet (FCoE)
Running fiber over Ethernet network.
81
Multiprotocol Label Switching (MPLS)
Transfer data based on the short path labels instead of the network IP addresses. No need of route table lookups.
82
Internet Small Computer Interface (iSCI)
Standard for connecting data storage sites such as storage area networks or storage arrays. Location independent.
83
Synchronous Data Link Control (SDLC)
IBM proprietary protocol use with permanent dedicated leased lines.
84
High-level Data Link Control (HDLC)
Use DTE/DCE communications. Extended protocol for SDLC
85
MD2
128-bit hash, 18 rounds of computations
86
MD4
128-bit hash. 3 rounds of computations, 512 bits block sizes
87
MD5
128-bit hash. 4 rounds of computations, 512 bits block sizes, Merkle–Damgård construction
88
MD6
Variable, 0
89
SHA-1
160-bit MD, 80 rounds of computations, 512 bits block sizes, Merkle–Damgård construction (not considered safe against well funded attackers)
90
SHA-2
224, 256, 384, or 512 bits, 64 or 80 rounds of computations, 512 or 1024 bits block sizes, Merkle–Damgård construction with Davies–Meyer compression function
91
Type I Error
False Rejection Rate
92
Type II Error
False Acceptance Rate
93
CER Crossover Error Rate
The point at which FRR equals FAR. This is expressed as a percentage - lower CER is better.
94
Enticement
* Is the legal action of luring an intruder, like in a honeypot
95
Entrapment
* Is the illegal act of inducing a crime, the individual had no intent of committing the crime at first
96
Business Continuity Plan BCP
Concerns the preservation and recovery of business in the event of outages to normal business operations
97
Business Impact Analysis (BIA)
The process of assessing the impact of an IT disruption. BIA is part of BCP
98
Disaster Recovery Plan (DRP)
A framework of steps and actions that need to be taken to achieve business continuity and disaster recovery goals. End Goal – Revert back to normal operations - planning and development must be done before the disaster - BIA should be complete
99
Business Continuity Steps
1. Scope and plan initiation 2. BIA - assess impact of disruptive processes 3. Business Continuity Plan development - Use BIA to develop BCP - Testing 4. Plan approval and implementation - management approval
100
DBMS Types
Hierarchical * Network * Mesh * Object-orientated * Relational
101
DDL Data definition language
defines structure and schema DML
102
Degree of Db
number of attributes (columns) in table
103
Tuple
rows
104
Foreign Key
reference to another table which include primary key. Foreign and primary keys link is known as referential integrity.
105
Token-passing
Sender can send only when token received indicating free to send.