08072017_NewHorizons Flashcards
An ACL is based on an ________
OBJECT
Which firewall operates at Layer 3 and 4?
Stateful Inspection Firewall
Relationship between GOALS and DOCUMENTS
STRATEGIC = POLICIES TACTICAL = STANDARDS and GUIDELINES OPERATIONAL = PROCEDURES and BASELINES
SLE Single Loss Expectancy formula
SLE =AV x EF
Integrity and ______ depend on each other
CONFIDENTIALITY
PPP replaced ____
SLIP
ATM is _____ switching. ATM can use both SVC and PVC.
CELL, ATM IS CELL SWITCHING
PRIVACY LAWS
ECPA, FERPA, GLBA, HIPAA, Privacy Act 1974
A ________ can function or operate as subject or objectt
PROCESS
Frame Relay is a packet switching technology that uses ______.
PVC
3 Access Control functions that happen AFTER an incident
Recovery Controls -
Corrective Controls - Return to Normal, Restoration, Escort a threat out building.
Detective Controls - IDS, AV
Spiral Mode is
Waterfall Model, considered meta-mode
A ________list maintains a row of security attributes for each controlled object. This list is the row of an access control matrix
CAPABILITIES
DRP is a component of BCP and focuses on _______ processes
Technical
3D’s, 2C’s, PR
Deterrent Directive Detective Compensating Corrective Preventive Recovery
STRIDE is used for
Threats
The maximum allowed ping packet size is ______bytes… PING OF DEATH must be at least ..
65,536
Ping of death must be 65,537
Name a few SQL aggregate functions
SUM, COUNT, MIN
What is essential to determine weakness or effectiveness of CONTROLS
Monitoring and Measuring
Documentation: Required implementation or use of tools
STANDARD
The maximum tolerable downtime (MTD) is equivalent to the …
recovery time objective (RTO)
DREAD is used to determine ________ of _______
Impact of threat
High Level overarching statement of management intentions. Purpose, scope and expectations
POLICY
ARP happens at Layer ___
3, Network Layer
Offshoot of impersonation. Uses eavesdropping. This replays captured traffic.
REPLAY ATTACK
BCP Project Management
Initiate BCP Project Define Scope and Plan Perform BIA Test Maintain the plan Implement Plan when DR strikes
This virus modifies their own code as they travel from system to system
POLYMORPHIC
Documentation: step by step to implement a system or process
PROCEDURES
_________ access control type limits physical access
Physical
Firewall that operates at Layer 3, examines data from message header.
Static Packet Filtering Firewall
DREAD - D’s stand for
Damage and Discoverability
Bimometric One to One
AUTHENTICATION
Residual Risk
Risk that remains after controls are in place
A RISK is..
A likelihood of a threat occurring as well potential to damage of assets.
Attack that targets 2 ROUND ENCRYPTION SUCH AS DOUBLE DES.
Meet in the Middle
Which layer do these occur in? PPTP, L2F, and L2TP
Layer 2
STRIDE - E stands for
Elevation of Priv
STRIDE - T stands for
Tampering with Data
Access Control that permits an OWNER or CREATOR of an object to control and define accessibility
DISCRETIONARY Access Control
ARO Annual Rate of Occurrence Formula
ARO = event number/year. If flood occurs 1 every 10yrs, 10%