testing questions missed Flashcards
what is MAC dealing with OSI and what layer
- Media Access Control
- Layer 2
OSI layer 2 - what is it and what operates there
- mac addresses
1. 48 bits
2. threats: mac spoofing and mac flooding - bridges and switches (L2) (asume L2 switch unless it says on the test)
- LLC (logic link control)
what is layer 4 of OSI model, what works there, what devices, what ports
- Transport layer
- responsible for end to end connection with error correction and detection
- Ports - 65,535 total (know some common ports)
- TCP/UDP and SSL/TLS(used to encrypt http and other data traffic) (makes sure to know tcp/udp nuances)
What are three major public key cryptosystems (algorithms)
- RSA
- El Gamal (less used)
- elliptic curve (strongest)
what type of network discovery scan only uses the fist two steps of the TCP handshake?
- tcp connect scan
- xmas scan
- tcp syn scan
- tcp ack scan
- tcp syn scan
Note: the syn scan is all you need because
* you send the syn and get the reply back of syn ack (first two steps)
what type of interface testing would identify flaws in a program’s command-line interface?
- application programming interface testing
- user interface testing
- physical interface testing
- security inteface testing
- user interface testing
* user inteface testing includes assessments of boht graphical user interfaces (GUIs) and command line interfaces (CLI) for a software program
Paul would like to test his application against slightly modified versions of previously used input. what type of test does Paul intend to perform?
- code review
- application vulernability review
- mutation fuzzing
- gereration fuzzing
- mutation fuzzing
uses bit flipping an other techniquest to slightly modifiy input testing
what information security management task ensures that the organization’s data protection requirements are met effectively?
- account management
- backup verification
- log review
- key performance indicators
- backup verification
NOTE: this was slighly tricky. verifying the backup processes are running properly is a check to help verify data protection
just enough to provide an answer - try not to over think
I went after performance indicators, thinking backup verification was not enough but I was wrong
which of the following steps would be included in a change management process (select all that apply)
- immediately implement the change if it will improve performance
- request the change
- create a rollback plan for the change
- document the change
- request the change
- create a rollback of the change
- document the change
documentation is not after the change request, its part of it
security administrators are regularly monitoring threat feeds and using that information to check systems with the network. their goal is to discover any infections or attacks that haven’t been detected by existing tools. what does this describe?
- threat hunting
- threat intelligence
- implementing the kill chain
- using artificial intelligence
- threat hunting.
Note: they are actively looking for attacks, not just using the intelligence gathered to build a better defense.
you operate a grain processing business and are developing your restoration priorities. which one of the following systems would likely be your highest priority?
- order processing system
- fire suppression system
- payroll system
- website
- fire suppression system
Note: always choose human life - fire suppression equals saving human life
Human safety is always NUMBER one
Electronic Discovery steps (EDRM)
eDiscovery steps
- Identification
- Preservation
- Collection
- Processing
- Review and Production
which one of the following attacker actions is most indicative of a terrorist attack
- altering sensitive trade secret documents
- damaging the ability to communicate a respond to a physical attack
- trasferring funds from an unapproved source into your account
- selling a botnet for use in a DDoS attack
- damaging the ability to communicate a respond to a physical attack
UEBA is what
- User and entity behavior analytices
- baselines of behavior modeling
- this typically involves machine learning
- denys, alerting, etc. when something is outside the norm
Cobit
- framework developed by the information systems audit and control association (ISACA) and the IT governance Institution (ITGI)
- defines goals for the controls that should properly manage IT and ensure IT maps to business needs, not just security needs
- COBIT broadly focuses on risk management that can be applied to various business areas
COBIT address what is to be achieved… ITIL address how to achieve
ITIL
- The Information Technology Infrastructure Library
- the de facto standard of best practices for IT service management
- a customizable framework, ITIL provides the goals, the general activities necessary to achieve these goals, and the input and output value for each process requied to meet these goals
COBIT address what is to be achieved..ITIL address how to achieve
OECD
- Organization for Economic Co-operationand Developement
- develeped guidelines for various countries so that data is properly protected and everyone follows the same rules
What is IP Masquerade
- IP Masquerade is a networking function in Linux similar to the one-to-many
a number of factors should be considered when assigning values to assets. which of the following is not used to determine the value of an asset?
- the assets value in the external marketplace
- the level of insurance required to cover the asset
- the initial and outgoing cost of purchasing, licensing, and supporting the asset
- the asset’s value to the organization’s production operations
- the level of insurance required to cover the asset
NOTE: the cost of insurance is not the important factor. you need to know the asset value before getting an isurance cost ( i guess duh)
risk assessment has several different methodologies. which of the follwing official risk methodologies was not created for the purpoose of analyzing security risks
- FAP
- OCTAVE
- ANZ 4360
- NIST SP 800-30
- anz 4360 -
* it can be used for risk assessment but was not created for that purpose
* ANZ 4360 can be used to understand a complany’s financial, capital, human safety and business decisions risk
name some offical risk assessment methodologies
- FRAP - (Facilitated Risk Analysis Process) aims to get conclusions about risks quicker.
- OCTAVE - a risk-based strategic assessment and planning technique for security
- NIST SP 800-30 - guide for conduction risk assessment
threat modeling methodology uses one of 3 approaches - what are these approaches
- attacker centric
- asset centric
- system (software) - centric
* according to CBK system or software centric methods like stride are the most useful
what is a threat modeling methodology that is an example of attacker centric and some attributes
- PASTA
* focuses on each threat and its TTP (tactics, techniques and procedures)
* starts by identifying threats then attempts to find vulnerability attack paths
what is an example of asset centric threat modeling methodology
- NIST 800-154
* first identifies critical assets
* then determines how threats might compromise them