study 4 Flashcards

(46 cards)

1
Q

Refers to attack and control circumvention attempts on a target’s network perimeter from outside the target’s system, usually the Internet

A

External Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.

A

Internal Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target’s information systems. Such testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.

A

Blind Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is a extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target and how well managed the environment is.

A

Double Blind Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to attack and control circumvention attempts on the target, while both the target’s IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.

A

Targeted Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Personnel who review result and deliverables within each phase and at the end of each phase, and confirm compliance with requirements. Their objective is to ensure that the quality of the project by measuring adherence of the project staff to the organization’s software development life cycle (SDLC), advise on the deviation and propose recommendation for process improvement or greater control points when deviation occur.

A

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensures that system controls and supporting processes provides an effective level of protection, based on the data classification set in accordance with corporate security policies and procedures: consult throughout the life cycle on appropriate security measures that should be incorporated into the system.

A

Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Completes assigned tasks, communicate effectively with the system developers by actively involving themselves in the development process as Subject Matter Expert (SME) and works according to local standards, and advise the project manager of expected and actual project deviations.

A

User Project Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Completes assigned tasks, communicates effectively with user by actively involving them in the development process, works according to local standards, and advise the project manager of necessary plan deviations.

A

System Development Project Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Project sponsor provides funding for the project and works closely with the project manager to define critical success factor(CSFs) and metrics for measuring the success of the project. It is crucial that success is translated to measurable and quantifiable terms. Data and application ownership are assigned to a project sponsor. A project sponsor is typically the senior manager in charge of the primary business unit that the application will support.

A

Project Sponsor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides day-to-day management and leadership of the project, ensures that project activities remain in line with the overall directions, ensures appropriate representation of the affected departments, ensures that the project adheres local standards, ensures that deliverable meet the quality expectation of key stakeholder, resolve interdepartmental conflict, and monitors and controls cost of the project timetables.

A

Project Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provides technical support for hardware and software environment by developing, installing and operating the requested system.

A

System Development Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides overall directions and ensures appropriate representation of the major stakeholders in the project’s outcome. The project steering committee is ultimately responsible for all deliverables, project costs and schedules. This committee should be compromised of senior representative from each business area that will be significantly impacted by the proposed new system or system modifications.

A

Project Steering Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Demonstrate commitment to the project and approves the necessary resources to complete the project. This commitment from senior management helps ensure involvement by those needed to complete the project.

A

Senior Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assumes ownership of the project and resulting system, allocates qualified representatives to the team, and actively participates in business process redesign, system requirement definitions, test case development, acceptance testing and user training.

A

User Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A certificate is a digital document that at a minimum includes what?

A
  1. a Distinguished Name (DN)

2. an associated public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is used to match an IP address to an Ethernet address so the packet can be sent to the appropriate node.

A

The Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is used to match an Ethernet address to an IP address

A

Reverse address resolution protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

L2TP Protocol works at what layer?

A

data link layer

20
Q

Secure Sockets Layer (SSL): Works at what layer?

A

transport layer

21
Q

IPSec: Works at what layer?

A

network layer, and provides security on top of IP

22
Q

Point-to-Point Tunneling Protocol (PPTP) Works at what layer?

A

data link layer

23
Q

What protection devices is used for spot protection within a few inches of the object,

A

Capacitance detectors

24
Q

is the act of gathering the necessary information so the best decision-making activities can take place.

A

Due Diligence

25
a gateway act as a ? Device
translation device | It could be used to translate from IPX to TCP/IP
26
A bridge work at what layer
at the data link layer
27
token ring IEEE #
802.5
28
IEEE 802.2 refers to what?
the logical link control
29
IEEE 802.11 refers to what?
wireless communications
30
IEEE 802.3 refers to what?
Ethernet's CSMA/CD
31
is used to send encrypted information using symmetric keys, and the relevant session key along with it. It is a secure method to send electronic document without compromising the data integrity,
Digital Envelope
32
he most common method of session hijacking is called
P spoofing
33
a computer with a ? firewall would respond to ACK packets sent to port TCP/80 when the port should not respond to unsolicited ACK packets for a non-existent TCP session.
stateless firewall
34
From most effective (lowest CER) to least effective (highest CER) are? (4)
1. Iris scan, 2. fingerprint, 3. voice verification 4. keystroke dynamics
35
a hamming code is used to create
parity information?
36
confirms that users’ needs have been met by the supplied solution.
Acceptance
37
is the formal testing of security safeguards and assurance is the degree of confidence that the implemented security measures work as intended.
Certification
38
Once an intrusion into your organization's information system has been detected, the first action that needs to be performed
Determine to what extent systems and data may be compromised.
39
using mathematical properties of modular arithmetic and a method known as
Computing in Galois fields
40
In which phase of the System Development Lifecycle (SDLC) is Security Accreditation Obtained?
Testing and evaluation control
41
n which phase of the System Development Lifecycle (SDLC) is implementation
Transition to production
42
decision support system (DSS) is know as
Delphi Method or Delphi Technique:
43
The main purpose of off-site hardware testing to ensure What?
The continued compatibility of the contingency facilities.
44
provides protection against sniffing and replay attacks but also provides message authentication and integrity.
SRTP - Secure Real-time Transport Protocol
45
SRTP uses what as the default cipher.
AES - Advanced Encryption Standard
46
is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC address?
is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC address?