All domains Flashcards
Kerckhoff’s principle
Crypto system must be secure even if crypto algorithm is public
Which crypto principles does IPSEC provide?
Confidentiality
Integrity
In what state does a processor’s scheduler place a process when it is prepared to execute but the CPU is not currently available?
Ready state
Processor Running State
Process is executing on the CPU
Process: Waiting State
Process is blocked waiting for an external event
Process: Ready State
Process is prepared to execute but the CPU is not available
Process: Stopped state
Used when a process terminates
Maintenance hook
Backdoor created by developers
Substitution cipher examples
AES, 3DES
Transposition cipher
One for one replacement of letters. Defeated by frequency analysis.
Data custodian
Implements security controls defined by policy and mgmt. Authority delegated from data owner.
Data custodian responsibilities
Validating data integrity
Testing backups
Implementing controls defined by policy
Data Purging
Removing data so it cannot be reconstructed. Ex. DBAN
Device sanitization
All of the processes used to remove data.
“Defensible Destruction”
4 Goals of Crypto
CAIN
Confidentiality
Authentication
Integrity
Non-repudiation
C
A
I
N
Confidentiality
Authentication
Integrity
Non-repudiation
Which backup type does not clear the archive bit?
Differential
Incremental backup
Backs up all data since previous backup
Differential backup
Backs up all data that changed since last full backup
Which backup type uses fewer tapes to restore?
Differential
Which backup type uses more tapes to restore?
Incremental
Which backup type is faster to restore?
Differential
Opposite of CIA
DAD
Disclosure
Alteration
Destruction
Which law protects trade secrets?
Economic Espionage Act
Covert timing attack
Modulating some aspect of system behavior over time.
Inference attack
Confinement aka…
Sandbox
Data steward
Ensures governance/compliance.
Manages data from business perspective.
Audits provide…
Assurance
Due Diligence
Assurance we’re doing the right thing.
Evidence that due care is working.
Due care
Doing the right thing.
Intangible asset valuation aka…
Intellectual property
Copyright length for software
95 years
Copyright length for creative expressions
70 years
Wassenaar Agreement
Covers weapons or dual use technologies (high encryption, VPN, etc.)
OECD
Oversees financial cooperation between nations
ISC Code of ethics (4)
- Protect society
2 Act legally - Provide competent service
- Advance the profession
SPML purpose
Provides service, user, and resource provisioning between organizations
Which is an OASIS standard markup language?
SPML
SAML purpose
Exchange authentication and authorization data
XACML purpose
Describe access controls
What do digital signatures provide TLS?
Authentication
Acceptable humidity levels
40%-60%
What type of packet does ping flood use?
ICMP echo request
RESTful, JSON-based authentication protocol
OpenID
Which two protocols are paired to provide identity verification and basic profile information?
OpenID
OAuth
Most effective defense against XSS attacks?
Input validation
What does an incipient fire detection system use to identify fires?
Air ionization
In what stage of the ISC2 incident response process does remediation occur?
Remediation
Take-grant security model
Used to assign-revoke rights.
Confidentiality
In what phase of the IR process are processes analyzed for potential improvements?
Lessons learned
Misuse case testing
Testing how a system can be misused
Can serial data over TCP/IP be encrypted?
Yes
Fagan
Highly structured code inspections
Pair programming
Two developers. One writes code while both discuss the coding process.
Which has higher availability? Cloud or Hybrid cloud?
Hybrid Cloud
SMURF attack traffic type
ICMP echo replies
What can be used to prevent DOS attacks?
Filtering
What do PPTP and L2F have in common?
They are IP protocols
Protocol for non-IP based VPN’s
L2TP
Civilian classification levels (3)
Confidential/Proprietary
Private
Sensitive
What testing methods are used in static analysis?
Walkthroughs
Sanity checks
Syntax checks
Logical code reviews
vlan hopping attack
Jumping vlans via the trunk by double tagging 802.1q frames
IR Phases (7)
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
What are code words for?
Shorten, hide, or clarify a message.
Characteristic of circuit switched networks
Dedicated between two endpoints
Cell switched network example
ATM
TGS: Ticket Granting Service
Receives TGT. Validates TGT and user rights. Then issues a ticket and session keys.
Difference between sampling and clipping in log review.
Sampling uses statistical techniques.
Clipping uses thresholds