3.1 - 3.2 Flashcards

1
Q

Secure real tine protocol

A

Take non encrypted convos and add encryption to it it uses AES to encrypt audio and video

Hmac-sha1 hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Time synchronization

A

Ntpsec from ntp has cleaned up vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

S/mime

A

Public private key encryption for emails and includes digital signatures

Pipulat to use pop3 with start tls and ssl

With imap can use secure imap

Briwsers should always use ssl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ssl/tls

A

Secure sockets layer replaced by transport layer security via http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ipsec tunnel

A

Security for osi layer
Encryption and packet signing

First authentication header, then encapsulation payload for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ftps and sftp

A

Ftps uses uses ssl

Sftp - ssh file transfer protocal, more management capabilities, listing interruptions, manipulate file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ldap

A

Lightweight directly access protocol

Standard for having a directory on network, used tcp/ip

Ldap secure - uses ssl for secure communication

Sasl is used by ldap and is a simple authentication and security layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ssh and dns

A

Secure shell replaces old telnet

Domain name system originally had no security to be redirected by hackers. Dns sec extension is added to validate info given to ensure it came from the place requested without changes in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Routing and switches

A

Snmpv3 protocol uses queuing and confidentiality of data simple network management protocol v3

Https not http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dhcp

A

Automatically assigns ip to netwrok and device

Hackers can manipulate so controls are added in active directory, assigns devices with permissions

Untrusted interfaces get blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Defense in deptg

A

Multifaceted defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

End point detection and response

A

Attacks usually from signatures but edr uses what the file is doing and other methods rather than block signature it blocks action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data loss prevention

A

Preventing data transfer from being seen, in the clear or encrypted form

Maybe a firewall cloud or clients system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ngfw

A

Next gen firewalls identifies apps regardless of hiding ip address can block at network level, includes decrypt and encrypt capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Host base firewalls

A

Firewalls also running on end points supported By host based firewall

Another is host bast intrusion detection system or host based intrusion prevention system

Can be integrated in host basted detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Boot integrity

A

Attackers want to get into an os to stay there and come back on, with a rootkit at kernal level.

17
Q

Trusted platform module

A

For cryptographic functions in the os such as a number generator and memory to store keys and is password protected with anti bruteforce

18
Q

Uefi bios has secure boot

A

Protections for software bios and can see fake bios and can check boot loaders at boot level and uses trusted certs to match a digital signature

19
Q

Trusted boot

A

Boot drivers and start up and uses elam before any apps start up to match signatures to check drivers

20
Q

Measured boot

A

For a network of computers to check for malwarez stores Hash and firmware

An attestation server will ensure nothing has been modified

21
Q

Database security

A

Tokenization where data isn’t really stored in it cause its replaced with a token its not hashing or encrypting

As a hash, save as a message digest, and different inputs have different values. One way trip. Can add salt to avoid rainbow tables

22
Q

Input validation

A

For secure coding data needs to be documented to see all data inout and ensure nothings is out of scope, for normalization, like a zip-code not allowing for letters .

Hackers use fuzzers to see if they can bug it out dynamic analysis to see if crash or buffer overflow or other vulnerability

23
Q

Secure cookies

A

Temporary info like session management info should be protected as secure cookies using https

24
Q

Http secure headers

A

Allows or disallows certain actions when apps in use like restricting info thats not https or allowing some types of data to be loaded into the page

25
Q

Code signing

A

Where app recognizes device that has trust, that trust can be compromised

26
Q

Static code analyzers

A

Helps identify security flaws

27
Q

Application hardening

A

Protect from known and unknown lm flaws can use compliance for hardening likes pcidss or nist

28
Q

Open ports or services

A

With firewall or limited ip address or ngfw that limits apps

Use nmpa to see which ports currently open then limit to those ports

29
Q

Registry

A

Primary configuration database for all things on the os, can see what an app modifies. Third party tools can show changes by using baseline

Can configure permissions, disable smbv1

30
Q

Samdboxxing

A

Limits scope of app to limit access to production environment to only a testing environment like a virtual machine