Quantum Review Flashcards

(60 cards)

1
Q

What is another term for a hash

A

One-way cryptograhpy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or false IVs are commonly used in hashing or one-way cryptography

A

False, IVs are typically used for standard encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which if the CIA Triad are the most important for ICS and OT Environments

A

Availability, because of the potential for harm and loss of life. If you cannot access an OT system, tehre could be a catastrophe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you mitigate detected XSS vulnerabilities

A

Output encoding, and escaping special characters - When you add a special character that affects how a string is interprereted, you can essentially mitigate the possiblity of code being executed by client browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would the act of inserting untrusted data into a webpage best describe

A

Possible XSS. This could be through stored forms like a forum, or though manipulating the code stored in a website itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a main concern for many companies when deciding whether or not to archive or remove data

A

Data Retention Policy. When a company is sorting through old data assets, this is likley their top priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False SOC 2 reports validate Security Controls

A

False, SOC 2 reports on Technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False A pentest will test security controls, and a lack thereof, by safeley trying to exploit vulnerabilites

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a risk assessment

A

To determine what risks the organization exist, and then to determine what controls, if any to deploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step to developing as SAT?

A

Understand the security posture. You need to understand the current weaknesses, vulnerabilities, and security issues to tailor the SAT to maximly benefit the org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is proveneance for evidence

A

The history of the evidence, including how it was colelcted, handled, and the chain of custory.

Ensuring the COC is properly documented is important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between data didling and a salami attack

A

Data Diddling is an incremental attack where an attacker makes small random changes to hide their actvitiy

Salam attacks are when small transactions deduct tiny amounts of money from different accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a policy

A

High level document that help guide decisions for senior management to make informaed decisions about the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wat is a mission statement

A

A formal summary of the goals of an ORG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer of the OSI model does Eavesdropping occur?

A

Data-Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer of the OSI Model Do Trogans occur

A

Layer 7 - app layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What layer of the model do Worms Exist

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layer of the OSI model do Fraggle attacks occur

A

Layer 5 - Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or false, Rainbow tables are .txt files

A

False, they are databases containing hashes and the value used to generate that hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the next step following a risk assessment, risk and risk treatment for risk identified in the previous step

A

Perform risk assessment, the process is never complete, and you need to evaluate what you put in place is treated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe the sutherland Model

A

Focuses on preventing interference in order to ensure the integrity of data. Is used to prevent attacks like covert channels. Biba, Bell Lapadula, and Take-Grant do not prevent covert channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the first 3 steps in E-Discovery

A
  • Information Goverance - Ensure information is well organized
  • Identification - Locate information covered by a discovery request
  • Preservation - Protect discoverable information against deletion or alteration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three steps following Preservation

A
  • Collection - Gather info centrally for discovery
  • Process - Sceen ollected infomration to filter out unecessary info prior to review
  • Analysis - Deep inspection of content and context of remaining infomration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the final 2 steps to e-discovery

A
  • Production - Places information into a form that can be shared
  • Presentation - Displays information to people
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does ISO 270001 provide
The framework for establishing, implementing, maintianig, and continously improving an ISMS.
26
Whare are the domains of 270001
Physicial Sec, Access Control, Risk Assessment, Incident Management.
27
True or False Two Person Control is the same as SOD
False, Dual control is requiring two people in order to do a specific task Seperation of duties splits work functions and actions up between different people so that one person isn't doing all the work
28
What items are you typically going to audit durring an account management assessment
You will likley begin with Highly Privelged accounts, then move on to a random sample of the larger population. Accounts that have been around longer are likley to have privilege creep
29
What does the hearsay rule establish
You cannot testify in court about something someone told you. HOWEVER, computer logs and how they were collected are exempt from this rule.
30
True or False, KRIs can be used to provide real-time incident response information
False, they are for risk planning and risk perceptions, not designed for real time IR
31
True or False Trojans have built in propogation methods
False, Worms have propogation methods that require no user interaction to spread.
32
True or False, Syslog uses priority level for the level of logging
False, it is called the secverity level. This outlines the level of logging that will be forwarded.
33
Describe Raid 0
Improves read/write performance through disk striping, but doesn’t offer redundancy
34
Describe Raid 1
Provides redundancy through disk mirroring. Contain two physical disks. Each disk contains copies of the same data, and either one may be used in the event the other disk fail
35
Describe RAID 5
Offers better storage efficiency with distributed parity. commonly used because it balances resilience and efficiency of storage space
36
Describe Raid 10
Combines mirroring (RAID 1) and striping (RAID 0) for both performance and redundancy.
37
Desceibe RAID 0
RAID 0 uses two disks as a single volume, allowing for an increase in speed but a decrease in reliability
38
What type of authenticator generates dynamic passwords using time‐ or algorithm‐based methods?
Tokens are hardware devices (something you have) that generate a one‐time password (OTP) based on time or an algorithm
39
What is the formula for determining the number of encryption keys required by a symmetric algorithm
((n*(n − 1))/2). With six users, you will need ((6*5)/2), or 15 keys.
40
What is the name of an SMTP Server that doesn't authenticate prior to relaying a message
Open Relay
41
True or False, an Emergency Response Guidline will include Long Term actions
False, The emergency response guidelines should include the immediate steps an organization should follow in response to an emergency situation
42
What interfaces are typically tested durring software testing
APIs, UIs, and physical interfaces
43
What two factors does Accountability rely on
Identification and authentication
44
What layer of the OSI model does eavesdropping occur at
The Data-Link Layer
45
What are some characteristics of the waterfall method
7 steps, allows for going back to previous step. Each phase must be completed before the next step.
46
True or False, the waterfall methodology is good for projects that have little up front planning
False, WF methodoffers limited flexibility for changes once the project has started. It’s well suited to projects that require heavy upfront planning
47
What are the first steps of the waterfall method
System Requirements Software Requirements Preliminary Design
48
What step of the waterfall method follows Preliminary Desgin
Detailed Design Code and Debug Testing Ops and Maintentence
49
What are the four principles to Agile
Individuals and Interactions over processes and tools Working software over comprehensive documentation Cutomer collaboration over contract negotiation Responding to change over folling a plan
50
What is SAFe
Scaled Agile - Builds on Agile by fostering: Cooridnation accross teams Strategic Alignment with the orgs objectives Emphasizes qualit Archetectula Syncrhronization Lean-Agile Leadserhip
51
An attacker compromises a KDC and is then able to generate a forged TGT, What attack has occured?
Goldent Ticket
52
An attacker steals a valid Kerberos ticket and uses it for authentication in place of a password, what has occured
Pass the ticket attack
53
An attacker brute forces a service ticket, what Kerberos Authentication do they circumvent by doing this, and what is this attack called
Silver ticket - They bypass the need for a ticket granting ticket
54
An attacker makes use of Service Principle Names and attempts to crack the encypted portion of the ticket offline. What might they gather, and what is the name of this attack
Kerberoasting - They can get the service account password
55
An attacker converted a stolen NTLM hash into a full kerberos ticket. What is this exploit called
Overpass-the-hash
56
If you wanted an internationally recognized framwork for Supply chains and management systems, which iso standard would work
ISO 28000
57
If you wanted an internationally recognized risk manamgement framework, which ISO standard would you adopt
ISO 31000
58
If you wanted an internationally recognized Business Continuity Planning Framework, which ISO Standard could you adopt
ISO 22301
59
What NIST Standard defines the NIST RMF
800-53
60