Testout Security Pro Flashcards

(239 cards)

1
Q

3DES

A

Triple DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control

A

The ability to permit or deny the privileges that users have when accessing resources on a network or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Auditing (or Access Control Accounting)

A

Maintaining a record of a subject’s activity within the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Control Authentication

A

The process of validating a subject’s identity. It includes the identification process, the user providing input to prove identity, and the system accepting that input as valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control Authorization

A

The granting or denying a subject’s access to an object based on the level of permissions or the actions allowed on the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Identification

A

Identifies the subject. Examples include a username or a user ID number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control Matrix

A

Provide an interface for implementing an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control Object

A

Data, applications, systems, networks and physical space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control Policy

A

Defines the steps & measures that are taken to control access to objects by subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control Subjects

A

Users, applications or processes that need access to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control System

A

The access control system includes the policies, procedures, and technologies, that’re implemented to control a subject’s access to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Account Lockout Threshold

A

Number of incorrect logon attempts that are allowed before the account is locked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Account Locout

A

Disables a user account after a specified number of incorrect logon attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Account Policies

A

Control the composition and use of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account Restrictions

A

Allow login only during certain days/hours, only from specific computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Accounting

A

Maintaining a record of a subject’s activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

activation mechanism

A

The virus only replicates when the activation mechanism is triggered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Active Directory

A

A directory service that uses a hierarchical database to store user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Active Directory Object Attributes

A

Every active directory object has attributes that’re populated with values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AD Domain

A

Objects are grouped together into a domain, usually denoted by a triangle. Domains are identified by their DNS Namespace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Administrative Control

A

Policies that describe accepted practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Administrive Access Control

A

Policies that describe accepted practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Algorithm
Process or formula used to convert a message into its meaning
26
Analytic Attack
Exploits a structural weakness in the algorithms
27
Application (Layer 7)
Integrates network functionality into OS. (For example: proxy firewall, gateway services, etc)
28
ARM
Advanced RISC Machine
29
Auditing
Maintaining a record of a subject's activity
30
Authentication
Users must prove that they are who they say they are
31
Authentication
Validating a subject identity
32
Authorization
Granting or denying a subject access
33
Authorization
Process of controlling access to resources
34
Authorization Table
Matrix of access control objects, subjects, and their associated rights
35
Basic Encoding Rules (BER)
Original rules for encoding abstract info into a concrete data stream. Specifies a set of self-identifying & self-delimiting schemes which allow each data value to be identified, extracted & decoded individually.
36
BER
Basic Encoding Rules
37
Birthday Attack
A brute force attack where the attacked hashes messages until one with the same hash is found.
38
Block cipher
Encrypts by transposing plain text in chunks (block-by-block).
39
Brewer-Nash
Prevent conflicts of interest by dynamically adjusting access based on current activity
40
Brute Force Attack
Attacker tries every known key combination
41
Cat5
cable specifications
42
Category 1 Active Directory Objects
Resources. (They can represent network resources, like printers.)
43
Category 2 Active Directory Objects
Security Principals, including users, computers and groups.
44
CBC
Cipher Block Chaining
45
CFB
Cipher Feedback
46
Cipher Text
Unreadable message
47
Clark-Wilson
Controlled intermediary access applications that prevent direct access to the back-end database
48
Class A
1.0.0.0 to 126.255.255.255
49
Class B
128.0.0.0 to 191.255.255.255
50
Class C
192.0.0.0 to 223.255.255.255
51
Class D
224.0.0.0 to 239.225.225.225
52
Class E
240.0.0.0 to 255.255.255.255
53
Clipping level of 9
Account will be locked after 9 incorrect attempts
54
Code Substitution
Hidden words with unrelated terms
55
Collision
Two different messages produce the same hash value.
56
Collision Resistance
A hash algorithm's ability to avoid the same output from two guessed inputs.
57
Compensative Access Control
Alternatives to primary access controls
58
Computer Policies also called?
Machine Policies
59
Confidentiality
Keep secrets a secret
60
Connection-oriented
Reliable data transmissions
61
Containment Rules
What types of objects can reside within other objects?
62
Content Dependent Access Control
CDAC
63
Context-based Access Control
CBAC
64
Corrective
Implement short-term repairs to restore basic functionality following an attack
65
Corrective Access Control
Implement short-term repairs to restore basic functionality following an attack
66
Creeping privileges
Escalation of privilege
67
Cryptanalysis Goal:
Retrieve as much info as possible
68
Cryptography
Process of counseling messages
69
Cryptology
Study of cryptography and cryptanalysis
70
Cryptosystem
Associated items of cryptographic
71
Cumulative Permissions
Access to more than one entity
72
Cyptanalysis
Recovering original data that has been encrypted w/o key
73
Cyptographer
Person who develops a converting plan
74
DAC
Discretionary Access Control
75
Data Link (Layer 2)
Defines rules and procedures for hosts as they access the Physical layer, including how multiple nodes share and coordinate the use of the same physical segment of the network.
76
Decryption
Procedure used to convert data from cipher text into plain text
77
Defense in Depth
Layered defenses at each level.
78
Define Content Dependent Access Control
Protects databases that contains sensitive information from a breach of privacy
79
Define Context-based Access Control
Mostly used to expand the decision-making capabilities of a firewall application
80
Define Discretionary Access Control
Assigns access directly to subject based on decision of the owner. Manages access using identity
81
Define Discretionary Access Control List
Implementation of discretionary access control
82
Define Federated Access Control
Arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group
83
Define Mandatory Access Control
Labels or attributes for subjects and objects
84
Define Role-Based Access Control
Allows access based on a role in an organization
85
Define Rule Set-Based Access Control
Characteristics of objects or subjects along with rules, to restrict access
86
Define System Access Control List
Used by Microsoft for auditing to identify past actions performed by users on an object
87
Define Task-Based Access Control
Individual work tasks assign privileges
88
Define Temporal Role-Based Access
Allows for role-based access control rules to only be in effect fora certain time period
89
Define View-based Access Control
Type of constrained user interface used to control a subject's access
90
Deny Permissions
Always override Allow permissions
91
DES
Data Encryption Standard
92
Detective
Search for details about the attack or the attacker
93
Detective Access Control
Search for details about the attack or the attacker
94
Deterrent
Discourage continued or escalations of attacks during an attack
95
Deterrent Access Control
Discourage continued or escalations of attacks during an attack
96
Dictionary Attack
Uses known words and common variations
97
Directory Schema
A list of attributes. Attributes from these lists are glued together to compose an object.
98
Directory Service
Example of a technical access control system that you use to manage and enforce access control policies.
99
Discretionary Access Control List
DACL
100
Domain Controllers
Holds a copy of the Active Directory database.
101
ECB
Electronic Code Book
102
Effective Permissions
Access rights are cumulative
103
EIA/TIA 232
serial signaling
104
Encryption
Process of using an algorithm to transform data from plain text to cipher text
105
Enforce Password Complexity
Harder passwords
106
Enforce Password History
Remember passwords so the user can't re-use passwords
107
Explicit Deny
Identifies users who are not allowed access
108
File Integrity
The downloaded file is complete, not corrupted whilst downloading, same as original and not virus-ridden.
109
FIM
Federated Access Control
110
Flat File Database
Unstructured, local user accounts.
111
Forests
A collection of trees that share a common global catalog and a common directory schema.
112
GPO
Group Policy Object
113
GPO affects
Only the location it is applied to
114
GPOs can't be linked
Built-In Containers
115
Group
Object that identifies a set of users with similar access needs
116
Hash
A function that takes a variable-length string, compresses it and transforms it into a fixed-length value.
117
Hierarchical Database
Allows you to sort and organize your user accounts by location, function and department. Allows you to replicate it.
118
High Amplification or The Avalanche Effect
A small change in the message results in a big change in the hashed value.
119
HMAC
Keyed-hash Message Authentication Code
120
IDEA
International Data Encryption Algorithm
121
Identification
Identifies the subject
122
Implicit Deny
Users are denied access unless they have been granted access
123
In-Band Distribution
Uses mechanisms such as the following to distribute the key:
124
Initialization Vector
Seed value used in encryption
125
Integrity
Ensures that information is not corrupted or altered
126
Interface ID
The last 64-bits.
127
IP address
Layer 3 address that is logically assigned to a host.
128
IPv4
A 32-bit binary number between 0 and 255, represented as four octets (four 8-bit numbers.)
129
IPv6
128-bit binary number
130
IPv6 Prefix
The first 64-bits.
131
IV
Initialization Vector
132
IV
Initialization Vector
133
Job Rotation
Staff are cross trained in different areas
134
Key
Variable in a cipher used to encrypt/decrpt a message
135
Key Cluster Attack
Occurs when different keys produce the same cuphertext
136
Key Space
Typically short, ranging from 56-bits to 512-bits.
137
Keystream
A sequence of bits which is used for encryption.
138
Keystream Generator
Produces long streams of bits with no patterns.
139
MAC
Mandatory Access Control
140
MAC address
Layer 2 address that's physically assigned in the firmware of the NIC.
141
MAC Classification Labels
Assigned to objects by the owner
142
MAC Clearance Labels
Assigned to subjects
143
Macro virus
A virus that takes advantage of application programs that use macros to automate repetitive functions.
144
Man-in-the-Middle
Attacker gets between two communicating parties
145
Mandatory Access Control (MAC)
MAC uses labels or attributes for both subjects and objects. Any operation by any subject on any object will be tested against a set of authorization rules to determine if the operation is allowed.
146
Maximum Password Age
Forces users to change the password after the specified time interval
147
MD5
Developed by RSA.
148
Member servers
When a server joins the Active Directory domain, it becomes a member, but it doesn't have a copy of the domain database.
149
Minimum Password Age
Prevent users from changing passwords too soon
150
Minimum password age set to 2
Users cannot change the password for 2 days.
151
Multipartite Virus
A virus that is a combination of multiple attacks.
152
Need to Know
Only allowed access if you need to know/use
153
Network (Layer 3)
Describes how data is routed across networks and on to the destination.
154
Network Address Translation (NAT)
Translates multiple private addresses into the single registered IP address.
155
Network Interface Cards (NICs)
Contain the MAC address and performs at Data Link layer.
156
Non-Discretionary Access Control
Prevents users from determining the read/white/execute rights for a file
157
Not an impotent aspect of password management
Enable account lockout
158
Object
Data, application, systems, networks, physical space
159
objective
The virus is programmed with this, which is usually to destroy, compromise, or corrupt data.
160
OFB
Output Feedback
161
One-time Pad
Method in which the plain text is converted to binary and combined with a string of randomly generated binary numbers
162
Order of GPOs
Local Group Policy, GPOs Linked to the domain, GPOs linked to the OU
163
Organizational Unit (OU)
Objects within a single domain being organized into OU's.
164
OSI Model
Open Systems Interconnection is a theoretical, 7-layer construct to explain how networking works.
165
Out-of-Band Distribution
Involves manually distributing the key.
166
Password Aging
Password only valid for a set time
167
Password Complexity
Prevents using passwords that are easy to guess or easy to crack
168
PES
Proposed Encryption Standard
169
PGP
Pretty Good Privacy
170
Physical (Layer 1)
Sets standards for sending and receiving electrical signals between devices.
171
Physical Access Control
Restricts physical access
172
Physical Control
Restrict physical access
173
PKI Attack
Attack attempts to trick a user into accepting a fake or spoofed certificate
174
Plain Text
Readable Message
175
Prefix Length
Identifies the number of bits in the relevant portion of the prefix
176
Presentation (Layer 6)
Presents data into compatible form.
177
Preventive
Deter intrusion or attacks
178
Preventive Access Control
Deter intrusion or attacks
179
Preventive Access Control
Deter intrusion or attacks.
180
Principle of Least Privilege
Users/Groups are only given access to what they need for their job, nothing more
181
Quantum Cryptography
Uses a series of photons to encrypt and send messages
182
RBAC
Role-Based Access Control
183
RC2
Ron's Code v2 or Ron's Cipher v2
184
RC4 (aka Ron's Code v4 or Ron's Cipher v4.)
The most frequently used symmetric-key stream ciphers.
185
RC4
Ron's Code v4 or Ron's Cipher v4
186
RC5
Ron's Code v5 or Ron's Cipher v5
187
Recovery
Restore the system to normal operations after the attack
188
Recovery Access Control
Restore the system to normal operations after the attack and short-term stabilization period.
189
replication mechanism
A file that the virus uses as a host.
190
RIPEMD
Developed by COSIC. Generates 128, 160, 256, or 320 bits.
191
RJ45
connector specifications
192
Round
Data going through one substitution and transposition process.
193
RSBAC (RBAC)
Rule Set-Based Access Control
194
SAM Account Name
Every user needs a unique name.
195
SAMAccountName
You can have users with the exact same names, as long as they're in different domains.
196
Sanitization
Process of cleaning a devices by having all data removed
197
Secure logon credential exchange
The password is used as the key to perform a hash on a challenge text value, and only the hashed value is passed... not the password. The receiving host use the same method to compare.
198
Security Principal
Object that can be given permission to an object
199
Self Service Password Management
Let the user be able to admin their passsword
200
Separation of Duties
Having more than one person to complete a task
201
Session (Layer 5)
Manages sessions in which data is transferred.
202
SHA-1
Developed by NIST and NSA. Generates 160 bits.
203
Side-Channel Attack
Tries to exploit information about the physical implementation f a cryptosystem
204
Star property of Bell-LaPadula
No write down
205
Statistical Attack
Exploits weakness in the design of a cryptosystem
206
Stealth Virus
A virus that resides in a low-level system service functions where they intercept system requests and alter service outputs their presence.
207
Steganography
Process of hiding messages
208
Stream ciphers
Encryption is performed on each bit within the stream in real time.
209
Subject
Needs access to objects
210
Subjects
Users, applications, processes.
211
Subnet Mask
32-bit number associated with each IPv4 address
212
Substitution Cipher
Replaces one set of characters with symbols or another character set
213
Switch
Operates at Data Link layer by reading the MAC address in a frame to make forwarding decisions.
214
Symmetric-Key Encryption
A form of cryptography that provides confidentiality with a weak form of authentication or integrity. It uses only one key to encrypt & decrypt data.
215
System Access Control List
SACL
216
Task-Based Access Control
TBAC
217
Technical Access Control
Computer Mechanisms that restrict access.
218
Technical Control
Computer mechanisms that restrict access
219
Temporal Role-Based Access
TRBAC
220
The AAA of Access Control
Authentication. authorization and auditing.
221
Transitive Two-Way Trusts
Lets us have other users over
222
Transmission Control Protocol (TCP)
Provides services that ensure accurate and timely delivery of network communications between two hosts. TCP is connection-oriented.
223
Transport (Layer 4)
TCP and UDP.
224
Transposition Cipher
Changes the position of characters in the plain text
225
Tree
A collection of one or more domains that exsist within the same DNS Namespace.
226
User Datagram Protocol (UDP)
Provides services of network communications between two hosts. UDP is connectionless.
227
V.35
modem signaling
228
View-based Access Control
VBAC
229
Virus
A program that attempts to damage a computer system and replicate itself to other computer systems.
230
What are key components of risk management?
Reduce the risk for an attack
231
What are the three entities of access control?
Objects, subjects and system.
232
What are the three main goals of the CIA of Security?
Confidentiality
233
What are three advantages of Hierarchical Databases?
Organization, delegation of administrator responsibilities, and replication.
234
What are three types of threat agents?
Employee
235
What challenges does a security professional face?
Sophistication - Complication of attacks
236
What is the difference between integrity and non-repudiation?
Integrity keeps the item fully in-tack and not messed with, non-repudiation always givens authentication
237
What process provides confidentiality by converting data into a form that it is unlikely to be usable by an unintended recipient?
Encryption
238
Which security expression refers to verifying that someone is who they say they are?
Authentication
239
WPA2
WiFi Protected Access 2