Security+ Flashcards
(283 cards)
“Subjects” are what?
Users or Groups that are accessing an object or resource
2 main components of IPSec?
Authentication Header (AH) Encapsulating Security Payload (ESP)
3 Primary IP Classes are?
Class A> 0.0.0.0 -> 127.255.255.255
Class B> 128.0.0.0 -> 191.255.255.255
Class C> 192.0.0.0 -> 192.255.255.255
AAA?
Authn
Authr
Accounting (tracking/auditing what-/where with logs)
What are the 4 models of Access Control?
ROLE Based Access Control (RBAC)
RULE Based Access Control
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
ARP?
Address Resolution Protocol - used once a packet makes it inside a network - ARP routes it to the correct machine on the network.
CHAP is similar to PAP in what way?
In what ways do they differ?
Both were used in PPP
Both use passwords or pins
PAP sent pins and passwords in the clear
CHAP uses a hashed password that is hashed with a nonce (number used once)
CIDR?
Classless Interdomain Routing notation
Cipher locks are?
Door with a code that requires punching in - mechanical or digital…
Corrective Controls include?
Intrusion Protection Systems or Active IDS - can engage to stop an ongoing attack
Backup and Recovery - can work to recover from an attack
Integrity?
Integrity provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data.
Detective Controls include?
DETECTIVE CONTROLS:
- Log monitoring
- Trend analysis
- Security Auditing
- Video monitoring
- Motion detection
Deterrent Controls include?
Dogs, Guards, Laws.
Most of the Preventative Controls can also be thought of a Deterrent as well (as in Security Guards)
Difference between Preventative and Detective Controls
Preventative are ACTIVE controls - that can stop an incident
Detective are PASSIVE controls - that can’t in themselves stop an incident
DNS records are organized with what desigations?
A (IPv4) - address/host records
AAAA (IPv6) - address
PTR - pointers (opposite of an A - if queried with an IP, it will return a hostname)
MX - mail exchange
CNAME - aliases
What is EAP used for and what is it associated with?
Extensible Authentication Protocol (EAP)
Associated with RADIUS / Wireless Authentication
Uses Tokens, Smart Cards, Certificates
How are Hash’s created and what are they used for?
hash is simply a number created by executing a hashing algorithm against data, such as a file or message. As long as the data never changes, the resulting hash will always be the same. By comparing hashes created at two different times, you can determine if the original data is still the same. If the hashes are the same, the data is the same. If the hashes are different, the data has changed.
UDP vs. TCP?
UDP uses a connectionless session (no 3-way handshake like TCP)
In Discretionary Access Control what is the basic model?
User Centric / User Chooses. LEAST restrictive.
All files and folders have owners and permissions..
This is true for Unix/Linux and NTFS based file systems..
In the context of Redundancy - what does SPOF mean?
Single Point of Failure
IPSec? Associated with what 3 technologies?
IP security.
1) VPN by way of an Internet Key Exchange (IKE) over UDP
2) associated with IPv6, but can be used with v4.
3) ISAKAMP - sec assoc. key mgmt protocol
IPv4 vs IPv6 - how many bits in each part of the address?
32bit for v4
128 for v6
IPv6 format?
8 groups of hexadecimal numbers separated by colons e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Hex numbers are 4 characters long.
NDP?
Associated with?
Neighbor Discovery Protocol
IPv6