1 Flashcards

1
Q

Incident response phases

A

Preparation
Detection & Analysis
Containment, Eradication & Recovery
Post-event activity

From NiST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of halon

A

1211 only in portable, streaming agent

1301 only in fixed, flooding agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sha

A

Secure Hash Algorithm
Hashing algorithm
20 byte output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A
Advanced Encryption Standard 
Original name rijndael
Block cipher
Block size 128
Key length 128, 192, 256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP

A

Extensible authentication protocol
Used by ppp
Support multi auth mechanisms
Token cards, smart cards, certs, opt, public key enc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Usage gap

A

Total potential - actual current usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used to authent asym keys

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit level firewall

A

Provides udp and tcp connection security

Operates transport and application layers such as session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stream cipher

A

Faster than block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PEAP

A

Protected Extensible Authentication Protocol
Mschap
Gtc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDEA

A

International data encryption algorithm

Symmetric block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DES

A

Data encryption standard

Symmetric block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blowfish

A

Symmetric block

Key 32 to 448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two fish

A

Symmetric block
Block 128
Key up to 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECB

A

Electronic Code Book
Block Cipher
Same key on each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CBC

A

Cipher Block Chaining
Block cipher
Uses IV on first block
Plaintext XORed with previous ciphertext before being encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PCBC

A

Propagating Cipher Block Chaining
Block Cipher
uses IV on first block
Plaintext XORed with both previous plaintext and previous ciphertext before being encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CFB

A

Cipher Feedback
makes a block cipher into a self-syncronizing stream cipher
if part of encrypted message lost, only part of decryption lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OFB

A

Output Feedback
makes a block cipher into a synchronous stream cipher
allows many error correction codes to function even when applied before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

smart cards

A

typically credit card sized
embedded IC
some have electrical contacts
does not display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MD5

A

Message Digest
Hash
128 hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SOM

A

Service-Oriented Modeling
Comprehensive view of analysis, design and arch of all software entities
View software entities as assets referred to as services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SOMF

A

Service-Oriented Modeling Framework
Modeling language for software development
practices, environments, disciplines, artifacts
SOA Value Proposition
Software Assets reuse
Architectural components abstraction
Business Traceability

24
Q

IPSEC Authentication Methods

A

Pre-shared key
Certificate
Kerberos

25
Q

Kerberos Components

A

3 main
Authentication Server
Ticket Granting Server
Principles Database

26
Q

IPComp

A

IP Payload Compression

27
Q

SABSA

A

Sherwood Applied Business Security Architecture
Business driven, risk and opportunity focused security architectures
traceably support business objectives

28
Q

SSH encrypt options

A

inlcude AES, Blowfish, 3DES, CAST128, Arcfour (RC4), IDEA

29
Q

L2TP

A

layer 2 Tunneling Protocol
operates at layer 2
Extenion of PPTP
Used to enable the operation of a VPN over Internet
Does not provide encryption or confidentiality by itself

30
Q

IPSec

A

protocol suite that authenticates and encrypts the packets of data sent over an IP network. used in VPNs.
Mutual Authentication

31
Q

RC4

A

aka ARC4

stream cipher

32
Q

RC5

A

Rivest Cipher
Symmetric
block cipher

33
Q

SKA

A

Shared Key Authentication

WEP encryption key shared in advance

34
Q

SwIPe

A

1993

Provides confidentiality, Integrity and authentication with end to end and intermediate hop security

35
Q

ALE

A

Annualized Loss Expectency

product of ARO (Annual Rate of Occurance) and SLE (Single Loss Expectancy)

36
Q

SLE

A

Single Loss Expectency

37
Q

ARO

A

Annual Rate of Occurance

38
Q

EF

A

Exposure Factor

Potential percentage of loss if a specific threat is realized

39
Q

AV

A

Asset Value

40
Q

MS-CHAPv2

A

Provides mutual authentication

41
Q

Layer 1 protocols

A

10BaseT
DSL, ISDN
Infrared

42
Q

Layer 2 protocols

A
ARP
ATM
CHAP
CDP
Ethernet
L2TP
MAC
PPP
PPTP
STP Spanning Tree Protocol
VLAN
43
Q

Layer 3

A
network layer
NAT
AppleTalk
IP
ICMP
ARP
RIP
OSPF
IPSec
44
Q

Layer 4

A
Transport Layer
ESP
NetBios
SPX
TCP
UDP
45
Q

layer 5

A
Session Layer - provides session management
netbios
RPC
SMB
SOCKS
46
Q

Layer 6

A
Presentation layer
TLS
SSL
FTP
IMAP
SSH
47
Q

Layer 7

A
Application Layer
SOAP
DHCP
DNS
HTTP/S
NFS
POP3
SNMP
Telnet
SSH
TFTP
48
Q

X.25

A

ITU-T protocol suite for packet switched WAN

49
Q

Skipjack

A

used by clipper chip

symmetric block cipher

50
Q

Clipper Chip

A

used Skip Jack to encrypt and Diffie Hellman key exchange

51
Q

MAC

A

Message Authentication Code

52
Q

SKIP

A

Simple Key Management for Internet Protocol
encryption tool used to protect sessionless datagram protocols.
designed to integrate with IPSec
layer 3

53
Q

ElGamal

A

Asymetric encryption

based on Diffie Hellman key exchange

54
Q

Blueprint

A

A detailed plan or program of action.

overall architecture first, then individual components

55
Q

Security Architecture

A

Think of same way home architecture
How many doors and windows are there?
Who is allowed in and out of each opening?
Must people in home identify self before going out and back in?
What possessions need protection?
What people need protection?