Test Study 6 Flashcards

(75 cards)

1
Q

What is the ISC2 code of ethics?

A

Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly , responsibly, and legally.
Provide diligent and competent service to principals.
Advance and protect the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What data state (in flight, at rest, etc) does SQLi affect?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SED?

A

Self-encrypting drives, primarily usb storage with automatic encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RTOS?

A

Real time operating system

Used in high speed robotics and manufacturing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of system should be used for robotics or manufacturing?

A

RTOS / Real time operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is type 1 virtualization?

A

Bare metal hypervisors, runs directly on the physical hardware of a host machine and doesn’t require an underlying operating system to load. Most efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is type 2 virtualization?

A

Hosted, runs on a host OS, it relies on the OS it is installed on for certain operations. Supports a wide range of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of virtualization doesn’t require a host operating system?

A

Type 1 / Bare Metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of virtualization relies on other portions of the system to handle things like CPU calls and network resources?

A

Type 2 / Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SAN certificate?

A

Subject Alternative Name
Allows a single certificate to possess and authenticate multiple names. Can handle multiple top level and sub domains, but requires explicitness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a wildcard certificate?

A

A certificate to secure multiple subdomains. Doesn’t require an explicit list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of domain certificate is good for multiple uses where you may add new subdomains repeatedly?

A

Wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of domain certificate should be used for multiple domains where you have a complete list of domains it should be used for?

A

SAN / Subject Alternate Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List and detail the certificate formats.

A

PEM, DER, PFX, CER, P12, P7B

PEM - most common format for CAs, contains any or all of the whole cert chain and keys, widely used by Unix, base 64 encoded ascii files, extensions such as .pem, .crt, .cer, .key, apache uses PEM

DER - binary form of a PEM key, storage of a single cert without private key or the chain, .cer and .der, typically used by Java

PFX, PKCS12, P12 - interchangeable, for storing a server or intermediate cert along with private key in one encrypted file

P7B / PKCS7 - contains certificates and chains, but not the private key, has extension .p7b, .p7c, used by several platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the most common certificate format issued by CAs?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the properties and makeup of a PEM file?

A

Base 64 encoded ascii file, can contain any or all of the cert, chain, and keys, typically uses .pem, .crt, .cer, .key, often used in Apache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the properties and makeup of a DER file?

A

Binary form of PEM, .cer or .der extensions, typically used in Java.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What certificate format is typically used in Java?

A

DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the properties and makeup of a PFX key?

A

PFX, PKCS12, P12
Use for storing the server and intermediate certificates and the private key in one encrypted file.
.pfx, .p12, typically used in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which certificate format is encrypted and stores the certificates and private key in one file?

A

PFX / PKCS12 / P12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the properties and makeup of a P7B file?

A

P7B/PKCS7
Base 64 encoded, can contain certificates and chain, but NOT private key
.p7b, .p7c
Supported by several platforms - Windows, Java, Tomcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which certificate format is base 64 encoded and contains the certificates and chains in one file, but not the private key?

A

P7B / PKCS7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which certificate format is base 64 encoded and contains the certificates, chains, and private key in one file?

A

PEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which certificate format is supported by several platforms such as Windows, Java, and Tomcat?

A

P7B / PKCS7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are some properties of transport mode vpn?
Point to point or end to end encryption | The IP payload is protected
26
What are some properties of tunnel encryption?
Uses ESP & AH Tunnel between two network devices, or site to site IP payload AND header are protected, entire IP packet becomes a payload of a new IP packet and header
27
Which vpn mode should be used for end to end encryption?
Transport
28
Which vpn mode should be used between networks?
Tunnel
29
What does transport mode protect?
Only the IP payload.
30
What does tunnel mode protect?
The IP payload and header
31
Which vpn mode encapsulates the entire IP packet?
Tunnel
32
What is FDDI?
Fiber Distributed Data Interface | Optical fiber based networking
33
What is a DISA?
Direct Inward System Access A feature of PBX that allows external callers to dial in to access or configure PBX Allows outside users access to an internal dial tone to allow for internal features used externally.
34
What is a PBX?
Private branch exchange | Central part of an organization's telephone system that interfaces with the PSTN
35
What phone feature allows for a business to split one single phone line among many internal extensions?
PBX
36
What phone feature allows a traveling employee to place a call that appears to come from the business itself?
DISA
37
What are the versions of Kerberos and what encryption do they use?
Kerberos 4 - DES | Kerberos 5 - AES
38
Which version of kerberos uses weaker encryption?
4, DES
39
Which version of kerberos uses AES?
5
40
What is a constrained interface?
A setting that restricts what users can see or limits functionality.
41
What feature can limit user functionality to add security?
Constrained interface
42
What ports might describe a Linux device being on the network?
22 and 111
43
What ports might describe a router being on the network?
22
44
What ports might describe a Windows workstation being on the network?
139 and 445
45
Ports 22 and 111 are found open on an IP, what device likely lives there?
Linux
46
Port 22 is found open on an IP, what device likely lives there?
Router / Switch
47
Ports 139 and 445 are found open on an IP, what device likely lives there?
Windows workstation
48
What is functional testing?
Verifying that the application works according to specifications
49
What is interface testing?
Verifying that different modules of the application work correctly together as a group.
50
What type of testing validates that different components are working together properly?
Interface
51
What type of testing verifies that applications are working according to their specifications?
Functional
52
What classification of evidence may be affected by being highly technical or hard to understand?
Relevance
53
What is something that threatens the relevance of evidence?
Being highly technical or hard to understand.
54
What is MTTR?
Meat time to recovery | How long it takes a system to recover from failure
55
What is the term for the duration it takes a system to recover?
MTTR
56
What is confusion?
Each bit of ciphertext should depend on several parts of the key. Confusion hides the relationship between the ciphertext and the key. Changes the key values used during repeated rounds of encryption Works with stream and block ciphers.
57
What is diffusion?
Changing a single bit of the plaintext then half of the ciphertext should change. Adds randomness to the ciphertext. Mixes up the location of the plaintext throughout the ciphertext. Hides the relationship between the ciphertext and the plain text. Only works with block ciphers.
58
What method of securing a cipher identity only works with block ciphers?
Diffusion
59
What method of securing a cipher identity works with stream and block ciphers?
Confusion
60
What method of securing a cipher identity hides the relationship between the ciphertext and the key?
Confusion
61
What method of securing a cipher identity hides the relationship between the ciphertext and the plain text?
Diffusion
62
What method of securing a cipher identity appears to add randomness to the ciphertext?
Diffusion
63
What method of securing a cipher identity makes the key appear to change repeatedly?
Confusion
64
What is NIST 800-160?
System Security Engineering
65
What is NIST 800-18?
Developing Security Plans
66
What is Nist 800-70
Repository of Security Checklists
67
Which NIST SP covers system security engineering?
800-160
68
Which NIST SP covers developing security plans?
800-18
69
Which NIST SP covers a repository of checklists?
800-70
70
What does ESP do?
Encapsulating security protocol | Secures the payload of a packet by using encryption
71
What does AH do?
Uses a hash function and a secret, shared key to allow integrity and authentication.
72
Which packet header secures the payload?
ESP
73
Which packet header ensures integirty?
AH
74
What is the Oakley protocol?
A key agreement protocol for exchanging keys across an insecure connection using Diffie-Helman, succeeded by IKE
75
What protocol is based on DH for key exchange?
Oakley