Test Study 6 Flashcards

1
Q

What is the ISC2 code of ethics?

A

Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly , responsibly, and legally.
Provide diligent and competent service to principals.
Advance and protect the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What data state (in flight, at rest, etc) does SQLi affect?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SED?

A

Self-encrypting drives, primarily usb storage with automatic encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RTOS?

A

Real time operating system

Used in high speed robotics and manufacturing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of system should be used for robotics or manufacturing?

A

RTOS / Real time operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is type 1 virtualization?

A

Bare metal hypervisors, runs directly on the physical hardware of a host machine and doesn’t require an underlying operating system to load. Most efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is type 2 virtualization?

A

Hosted, runs on a host OS, it relies on the OS it is installed on for certain operations. Supports a wide range of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of virtualization doesn’t require a host operating system?

A

Type 1 / Bare Metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of virtualization relies on other portions of the system to handle things like CPU calls and network resources?

A

Type 2 / Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SAN certificate?

A

Subject Alternative Name
Allows a single certificate to possess and authenticate multiple names. Can handle multiple top level and sub domains, but requires explicitness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a wildcard certificate?

A

A certificate to secure multiple subdomains. Doesn’t require an explicit list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of domain certificate is good for multiple uses where you may add new subdomains repeatedly?

A

Wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of domain certificate should be used for multiple domains where you have a complete list of domains it should be used for?

A

SAN / Subject Alternate Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List and detail the certificate formats.

A

PEM, DER, PFX, CER, P12, P7B

PEM - most common format for CAs, contains any or all of the whole cert chain and keys, widely used by Unix, base 64 encoded ascii files, extensions such as .pem, .crt, .cer, .key, apache uses PEM

DER - binary form of a PEM key, storage of a single cert without private key or the chain, .cer and .der, typically used by Java

PFX, PKCS12, P12 - interchangeable, for storing a server or intermediate cert along with private key in one encrypted file

P7B / PKCS7 - contains certificates and chains, but not the private key, has extension .p7b, .p7c, used by several platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the most common certificate format issued by CAs?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the properties and makeup of a PEM file?

A

Base 64 encoded ascii file, can contain any or all of the cert, chain, and keys, typically uses .pem, .crt, .cer, .key, often used in Apache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the properties and makeup of a DER file?

A

Binary form of PEM, .cer or .der extensions, typically used in Java.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What certificate format is typically used in Java?

A

DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the properties and makeup of a PFX key?

A

PFX, PKCS12, P12
Use for storing the server and intermediate certificates and the private key in one encrypted file.
.pfx, .p12, typically used in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which certificate format is encrypted and stores the certificates and private key in one file?

A

PFX / PKCS12 / P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the properties and makeup of a P7B file?

A

P7B/PKCS7
Base 64 encoded, can contain certificates and chain, but NOT private key
.p7b, .p7c
Supported by several platforms - Windows, Java, Tomcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which certificate format is base 64 encoded and contains the certificates and chains in one file, but not the private key?

A

P7B / PKCS7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which certificate format is base 64 encoded and contains the certificates, chains, and private key in one file?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which certificate format is supported by several platforms such as Windows, Java, and Tomcat?

A

P7B / PKCS7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are some properties of transport mode vpn?

A

Point to point or end to end encryption

The IP payload is protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are some properties of tunnel encryption?

A

Uses ESP & AH
Tunnel between two network devices, or site to site
IP payload AND header are protected, entire IP packet becomes a payload of a new IP packet and header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which vpn mode should be used for end to end encryption?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which vpn mode should be used between networks?

A

Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does transport mode protect?

A

Only the IP payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does tunnel mode protect?

A

The IP payload and header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which vpn mode encapsulates the entire IP packet?

A

Tunnel

32
Q

What is FDDI?

A

Fiber Distributed Data Interface

Optical fiber based networking

33
Q

What is a DISA?

A

Direct Inward System Access
A feature of PBX that allows external callers to dial in to access or configure PBX
Allows outside users access to an internal dial tone to allow for internal features used externally.

34
Q

What is a PBX?

A

Private branch exchange

Central part of an organization’s telephone system that interfaces with the PSTN

35
Q

What phone feature allows for a business to split one single phone line among many internal extensions?

A

PBX

36
Q

What phone feature allows a traveling employee to place a call that appears to come from the business itself?

A

DISA

37
Q

What are the versions of Kerberos and what encryption do they use?

A

Kerberos 4 - DES

Kerberos 5 - AES

38
Q

Which version of kerberos uses weaker encryption?

A

4, DES

39
Q

Which version of kerberos uses AES?

A

5

40
Q

What is a constrained interface?

A

A setting that restricts what users can see or limits functionality.

41
Q

What feature can limit user functionality to add security?

A

Constrained interface

42
Q

What ports might describe a Linux device being on the network?

A

22 and 111

43
Q

What ports might describe a router being on the network?

A

22

44
Q

What ports might describe a Windows workstation being on the network?

A

139 and 445

45
Q

Ports 22 and 111 are found open on an IP, what device likely lives there?

A

Linux

46
Q

Port 22 is found open on an IP, what device likely lives there?

A

Router / Switch

47
Q

Ports 139 and 445 are found open on an IP, what device likely lives there?

A

Windows workstation

48
Q

What is functional testing?

A

Verifying that the application works according to specifications

49
Q

What is interface testing?

A

Verifying that different modules of the application work correctly together as a group.

50
Q

What type of testing validates that different components are working together properly?

A

Interface

51
Q

What type of testing verifies that applications are working according to their specifications?

A

Functional

52
Q

What classification of evidence may be affected by being highly technical or hard to understand?

A

Relevance

53
Q

What is something that threatens the relevance of evidence?

A

Being highly technical or hard to understand.

54
Q

What is MTTR?

A

Meat time to recovery

How long it takes a system to recover from failure

55
Q

What is the term for the duration it takes a system to recover?

A

MTTR

56
Q

What is confusion?

A

Each bit of ciphertext should depend on several parts of the key.
Confusion hides the relationship between the ciphertext and the key.
Changes the key values used during repeated rounds of encryption
Works with stream and block ciphers.

57
Q

What is diffusion?

A

Changing a single bit of the plaintext then half of the ciphertext should change.
Adds randomness to the ciphertext.
Mixes up the location of the plaintext throughout the ciphertext.
Hides the relationship between the ciphertext and the plain text.
Only works with block ciphers.

58
Q

What method of securing a cipher identity only works with block ciphers?

A

Diffusion

59
Q

What method of securing a cipher identity works with stream and block ciphers?

A

Confusion

60
Q

What method of securing a cipher identity hides the relationship between the ciphertext and the key?

A

Confusion

61
Q

What method of securing a cipher identity hides the relationship between the ciphertext and the plain text?

A

Diffusion

62
Q

What method of securing a cipher identity appears to add randomness to the ciphertext?

A

Diffusion

63
Q

What method of securing a cipher identity makes the key appear to change repeatedly?

A

Confusion

64
Q

What is NIST 800-160?

A

System Security Engineering

65
Q

What is NIST 800-18?

A

Developing Security Plans

66
Q

What is Nist 800-70

A

Repository of Security Checklists

67
Q

Which NIST SP covers system security engineering?

A

800-160

68
Q

Which NIST SP covers developing security plans?

A

800-18

69
Q

Which NIST SP covers a repository of checklists?

A

800-70

70
Q

What does ESP do?

A

Encapsulating security protocol

Secures the payload of a packet by using encryption

71
Q

What does AH do?

A

Uses a hash function and a secret, shared key to allow integrity and authentication.

72
Q

Which packet header secures the payload?

A

ESP

73
Q

Which packet header ensures integirty?

A

AH

74
Q

What is the Oakley protocol?

A

A key agreement protocol for exchanging keys across an insecure connection using Diffie-Helman, succeeded by IKE

75
Q

What protocol is based on DH for key exchange?

A

Oakley