401/501 Study Guide Flashcards

1
Q

What Port is DNS?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA Triad

A

C - Confidentiality
I - Integrity
A - Availability

**These three are EQUALLY as important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When information remains true to the creators intent

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some common network applications that use UDP?

A
  • Domain Name System (DNS)
  • Streaming media…like IPTV
  • Voice over IP (VoIP)
  • Trivial File Transfer Protocol (TFTP)
  • Many online games
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information conforms to reality

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to 1000 Foot View, what are the core principles of IA?

A

Confidentiality, Availability, Authenticity, Authorized Use, Privacy, Non-Repudiation, Utilization, Possession, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When information is fit for a purpose and in a usable state

A

Utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Only authorized personnel may access cost incurring services
Ex.) toll-fraud prevention

A

Authorized Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Five DIACAP Activities?

A
  1. Initiate & Plan IA C&A
  2. Implement & Validate assigned IA Controls
  3. Make Certification Determination & Accreditation Decision
  4. Maintain Authorization to Operate & Conduct Reviews
  5. Decommission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When only authorized personnel may disclose or observe information

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When the originator of message or transaction may not later deny action

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DIACAP stand for?

A

Department of Defense Information Assurance Certification Accreditation Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Port is HTTP?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the OSI Model Diagram provides end-to-end data transmission integrity?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who invented the one-time password?

A

Gilbert Vernam
Called it the “Vernam Cipher”
1917

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

*a simpler message-based connectionless protocol

Communication is achieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver

  • connectionless protocols do not set up a dedicated end-to-end connection
A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer of the OSI Model Diagram establishes, maintains and manages sessions?
For example~ the synchronization of data flow

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Port 110?

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does OSI stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 7 levels of the OSI Model Diagram?

A
7     Application 
6     Presentation 
5     Session 
4     Transport 
3     Network 
2     Data Link
1     Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What layer of the OSI Model Diagram provides data representation between systems?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What layer of the OSI Model Diagram provides transfer of information units to the other end of the physical link?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What Port is HTTPS?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An attack in which the attacker sends a large number of connection or information requests to overwhelm and cripple a target

A

Denial-of-Service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What Port is LDAP?

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The process of using social skills to convince people to reveal access credentials or other valuable information to the attacker

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When information is ready for use within stated operational parameters

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The industry standard for computer security since the development of the mainframe.
Known as the Holy Trinity of IA

~based on 3 characteristics that describe the utility of information.

A

C.I.A. Triad

Based on confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A self-replicating computer program that uses a network to send copies of itself to other nodes, and it may do so without any user intervention. It does not need to attach itself to an existing program

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What hackers do – The Five Phases of Hacking

A
Phase 1 - Reconnaissance 
Phase 2 - Scanning 
Phase 3 - Gaining Access 
Phase 4 - Maintaining Access
Phase 5 - Covering Tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Software designed to infiltrate a computer without the owner’s informed consent

A

Malware

-short for malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An attack in which a coordinated stream of connection requests is launched against a target from many locations at the same time

ie. Black Friday, Cyber Monday, Super Bowl Sunday

A

Distributed Denial-of-Service (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A bit pattern that defines which portion of the 32 bits represents a subnet address

A

Subnet Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What Port is FTP?

A

20, 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This can provide a two-factor authentication method because the user may have to enter a PIN. This means the user must provide something she knows and something she has

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Port 143?

A

IMAP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the Access Control Methods?

A
  • Implicit deny
    〰 First answer is no
  • Least privilege
    〰 Only permissions they need
  • Separation of duties
    〰 Avoid “collusion”
  • Job rotation
38
Q

A protected string of characters that is used to authenticate an individual

A

Password

39
Q

What layer of the OSI Model Diagram transmits bit stream on a physical medium?

A

Physical

40
Q

What is Port 119?

A

NNTP

41
Q

What are the Access Control Models?

A

Mandatory Access Control (MAC)
&
Discretionary Access Control (DAC)

42
Q

Human readable text

A

Plaintext

43
Q

What layer of the OSI Model Diagram switches & routes information units?

A

Network

44
Q

What Port is SSH?

A

22

45
Q

The three tenants of Authentication

A

⭐️ Something a person knows (password)
⭐️ Something a person has (smartcard)
⭐️ Something a person is (fingerprint)

⭐️⭐️⭐️any 2 of these = Strong Authentication

46
Q

Malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system

A

Trojan Horse

47
Q

What is Port 25?

A

SMTP

48
Q

Difference between MAC & DAC

A

〰MAC〰
⚡️ inflexible, predefined
⚡️ labor intensive

49
Q

A program that searches out other programs & infects them by embedding a copy of itself. When the infected program executes, it is also executed, which begins the infection

A

Virus

50
Q

Group policies, Password policies, User names & passwords, Time of day restrictions, Account expiration, ACLs and Logical tokens are all a part of what?

A

Logical Access Control

51
Q

An authentication protocol that challenges the system to verify identity.

Also, it’s an improvement over PAP

A

CHAP
Challenge Handshake Authentication Protocol

In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet access provider.
CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. CHAP requires that both the client and server know the plaintext of the secret, although it is never sent over the network.
Microsoft has implemented a variant of the Challenge-handshake authentication protocol, called MS-CHAP, which does not require either peer to know the plaintext.

52
Q

What Port is Kerberos?

A

88

53
Q

Privilege escalation, Spyware, Weak passwords, Back doors, Adware, Default accounts and Rootkits are all different types of what?

A

Vulnerabilities & mitigations associated with network devices

⭐️ System Security Threats

54
Q

What layer of the OSI Model Diagram provides specific services for applications, such as file transfer?

A

Application

55
Q

What is Port 23?

A

Telnet

56
Q

Role Based Access Control vs. Rule Based Access Control

A

✨ Role based access control
〰Job Function = Role(s)
〰Roles are assigned permissions

✨ Rule based access control
〰Ex : Allow * or Deny *

57
Q

Authenticity is necessary to be able to do what?

A

To ensure that the users or objects (like documents) are genuine & that they have not been forged or fabricated

For example: Authentication breech can occur when a user’s login id and password is used by un-authorized users to send un-authorized information.

58
Q

What class of network is 201.168.10.32?

A

Class C

59
Q

This is also called a dynamic password. It is used for authentication purposes and is only good once

A

One-Time password

One-Time pad

60
Q

When a hacker has a collection of these compromised systems, it is referred to as a __________.

A

Botnet

〰 a network of bots

61
Q

Substitution Cipher

A

a method of encryption in which units of plaintext are replaced with ciphertext according to a regular system.

62
Q

Transposition Cipher

A

a method of encryption by which the positions held by units of plaintext are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext

63
Q

IA vs. IS

A

Information assurance is closely related to information security and the terms are sometimes used interchangeably.

IA is best thought of as a superset of information security
IA is interdisciplinary and draws from multiple fields, including accounting, fraud examination, forensic science, management science, systems engineering, security engineering, and criminology, in addition to computer science.

IA’s broader connotation also includes reliability and emphasizes strategic risk management over tools and tactics.
In addition to defending against malicious hackers and code (e.g., viruses)

IA includes other corporate governance issues such as privacy, compliance, audits, business continuity, and disaster recovery.

64
Q

Differences between TCP & IP

A

☝️ TCP operates at a higher level
❗️concerned with only two-end systems
i.e. a Web browser and a Web Server

☝️ IP handles lower level transmissions from computer to computer as a message makes its way across the Internet

65
Q

Protect personal privacy and adhere to relevant privacy compliance requirements

A

Privacy

65
Q

Encrypted or machine readable text

A

Ciphertext

66
Q

When information remains in the custody of authorized personnel

A

Possession

68
Q

Who has access?

A

A cornerstone in the foundation of information security is controlling how resources are accessed so they can be protected from unauthorized modification or disclosure. The controls that enforce access control can be technical, physical, or administrative in nature.

69
Q

TCP/IP

A
70
Q

Transmission Control Protocol - TCP

A
71
Q

What are some ways you can identify & authenticate who is connecting?

A
72
Q

RADIUS

A

(Remote Authentication Dial In User Service)

73
Q

Firewall Terms

A
74
Q

Firewall types

A
75
Q

What Port is TFTP?

A

69

76
Q

Kerberos

A

-the way that Windows operates
­user requests access to service running on a different server
­-KDC authenticates user and sends a ticket to be used between the user and the service on the server
-

77
Q

UDP

A

A simpler message-based connectionless protocol (no handshake)
● Connectionless protocols do not set up a dedicated end-to-end connection
● Communication is achieved by transmitting information in one direction from
source to destination without verifying the readiness or state of the receiver
● Streaming videos, games
● Common network applications that use UDP include:
o Domain Name System (DNS)
o Streaming media applications such as IPTV o Voice over IP (VoIP)

78
Q
Which of the following are capable of functioning as a Firewall? Choose two.
 Proxy
 Router
 PC
 Switch
A

Proxy service as well as the Router is both capable of Network Address translation (NAT) which is the basic function of a firewall.

79
Q

Subnetting

A

using the subnet mask value to divide a network into smaller components. This gives you more networks but a smaller number of hosts available on each.
o Subnetting uses bits from the node portion of the host address to create the additional networks, and there are two primary reasons for using it:
1. To use IP addresses more effectively
2. To make the network more secure and manageable
• It accomplishes the latter by confining traffic to the network that it needs to be on, reducing overall network traffic and creating more broadcast domains, thus reducing the range of network-wide broadcast traffic.

80
Q

Web security gateway

A

A web security gateway and a unified threat management appliance both combine multiple security controls into a single appliance. They can inspect data streams and often include URL filtering, malware inspection, and content inspection components.

81
Q

Private IP Addresses

A
Class
Beginning address
Ending address
Class A
10.0.0.0
10.255.255.255
Class B
172.16.0.0
172.31.255.255
Class C
192.168.0.0
192.168.255.2
82
Q

Protocols

A

our agreed­upon method of communication
­Rules for communication
­Often part of a protocol suite or framework ­Described by their functions and interactions ­Protocols need to talk to other protocols

83
Q

Firewalls

A

Hardware-based network firewall inspects packets
–Can either accept or deny packet entry
–Usually located outside network security perimeter

84
Q

Firewall actions on a packet

A

-Allow (let packet pass through)
–Block (drop packet)
–Prompt (ask what action to take)

85
Q

Elements of a secure network design

A

-Demilitarized zones
–Subnetting
–Virtual LANs
–Remote access

86
Q

Demilitarized Zone

A

~Separate network located outside secure network perimeter

•Untrusted outside users can access DMZ but not secure network

87
Q

Subnetting

A

IP address may be split anywhere within its 32 bits
•Network can be divided into three parts
–Network
–Subnet
–Host
•Each network can contain several subnets
•Each subnet can contain multiple hosts

88
Q

Port 7

A

Echo
❖ TCP or UDP
❖ Testing round trip times between hosts

89
Q

Types of security hardware logs

A

NIDS, NIPS, DNS, proxy servers, and firewalls

90
Q

Log analysis

A

-Log records events that occur
–Monitoring logs can be useful in determining how attack occurred
–System logs and security application logs
–Network security logs

91
Q

Firewall log items to be examined

A
-IP addresses rejected and dropped
–Probes to ports that have no application servers on them
–Source-routed packets
–Suspicious outbound connections
–Unsuccessful logins
92
Q

System events log record:

A

-Client requests and server responses
–Usage information
–Account information
–Operational information

93
Q

Benefits of monitoring system logs:

A

-Identify security incidents, policy violations, fraudulent activity
–Provide information shortly after event occurs
–Provide information to help resolve problems
–Help identify operational trends and long-term problems
–Provide documentation of regulatory compliance