All domains Flashcards
Kerckhoff’s principle
Crypto system must be secure even if crypto algorithm is public
Which crypto principles does IPSEC provide?
Confidentiality
Integrity
In what state does a processor’s scheduler place a process when it is prepared to execute but the CPU is not currently available?
Ready state
Processor Running State
Process is executing on the CPU
Process: Waiting State
Process is blocked waiting for an external event
Process: Ready State
Process is prepared to execute but the CPU is not available
Process: Stopped state
Used when a process terminates
Maintenance hook
Backdoor created by developers
Substitution cipher examples
AES, 3DES
Transposition cipher
One for one replacement of letters. Defeated by frequency analysis.
Data custodian
Implements security controls defined by policy and mgmt. Authority delegated from data owner.
Data custodian responsibilities
Validating data integrity
Testing backups
Implementing controls defined by policy
Data Purging
Removing data so it cannot be reconstructed. Ex. DBAN
Device sanitization
All of the processes used to remove data.
“Defensible Destruction”
4 Goals of Crypto
CAIN
Confidentiality
Authentication
Integrity
Non-repudiation
C
A
I
N
Confidentiality
Authentication
Integrity
Non-repudiation
Which backup type does not clear the archive bit?
Differential
Incremental backup
Backs up all data since previous backup
Differential backup
Backs up all data that changed since last full backup
Which backup type uses fewer tapes to restore?
Differential
Which backup type uses more tapes to restore?
Incremental
Which backup type is faster to restore?
Differential
Opposite of CIA
DAD
Disclosure
Alteration
Destruction
Which law protects trade secrets?
Economic Espionage Act
Covert timing attack
Modulating some aspect of system behavior over time.
Inference attack
Confinement aka…
Sandbox
Data steward
Ensures governance/compliance.
Manages data from business perspective.
Audits provide…
Assurance
Due Diligence
Assurance we’re doing the right thing.
Evidence that due care is working.
Due care
Doing the right thing.
Intangible asset valuation aka…
Intellectual property
Copyright length for software
95 years
Copyright length for creative expressions
70 years
Wassenaar Agreement
Covers weapons or dual use technologies (high encryption, VPN, etc.)
OECD
Oversees financial cooperation between nations
ISC Code of ethics (4)
- Protect society
2 Act legally - Provide competent service
- Advance the profession
SPML purpose
Provides service, user, and resource provisioning between organizations
Which is an OASIS standard markup language?
SPML
SAML purpose
Exchange authentication and authorization data
XACML purpose
Describe access controls
What do digital signatures provide TLS?
Authentication
Acceptable humidity levels
40%-60%
What type of packet does ping flood use?
ICMP echo request
RESTful, JSON-based authentication protocol
OpenID
Which two protocols are paired to provide identity verification and basic profile information?
OpenID
OAuth
Most effective defense against XSS attacks?
Input validation
What does an incipient fire detection system use to identify fires?
Air ionization
In what stage of the ISC2 incident response process does remediation occur?
Remediation
Take-grant security model
Used to assign-revoke rights.
Confidentiality
In what phase of the IR process are processes analyzed for potential improvements?
Lessons learned
Misuse case testing
Testing how a system can be misused
Can serial data over TCP/IP be encrypted?
Yes
Fagan
Highly structured code inspections
Pair programming
Two developers. One writes code while both discuss the coding process.
Which has higher availability? Cloud or Hybrid cloud?
Hybrid Cloud
SMURF attack traffic type
ICMP echo replies
What can be used to prevent DOS attacks?
Filtering
What do PPTP and L2F have in common?
They are IP protocols
Protocol for non-IP based VPN’s
L2TP
Civilian classification levels (3)
Confidential/Proprietary
Private
Sensitive
What testing methods are used in static analysis?
Walkthroughs
Sanity checks
Syntax checks
Logical code reviews
vlan hopping attack
Jumping vlans via the trunk by double tagging 802.1q frames
IR Phases (7)
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
What are code words for?
Shorten, hide, or clarify a message.
Characteristic of circuit switched networks
Dedicated between two endpoints
Cell switched network example
ATM
TGS: Ticket Granting Service
Receives TGT. Validates TGT and user rights. Then issues a ticket and session keys.
Difference between sampling and clipping in log review.
Sampling uses statistical techniques.
Clipping uses thresholds
Cognitive passwords
Passwords that are answers to a series of questions
Multistate systems
Handle data from different security classifications
Incremental backup backs up…
Files changed since last backup
Identity as a service
Third party identity service
OpenID vs. OAuth
OpenID: Authentication
OAuth: Authorization
Netflow records
Contain every network communication session
What does IDS record?
Detections
What two logical network topologies can be physically implemented as a star topology?
Bus
Ring
Preaction steps
Fill with water when fire is detected
Dispense water when heat sensors trigger
What does ESP encrypt?
IP packet data, but not the header
Exposure factor is…
Percentage of asset loss
Exposure factor calculation
SLE x Asset Value=Exposure Factor
ARO less than one
Percentage less than 1. 1 represents 100%.
ALE calculation
SLE * ARO = ALE
First step in the User provisioning process…
Enrollment (registration)
Which security framework is an “appraisal”
CMMI
Clark-Wilson goal
Prevent fraud
Security model that uses transformation procedures and integrity verification procedures
Clark-Wilson
Security model that uses access-control triple
Clark-Wilson
Brewer-Nash Confidentiality model purpose
Conflicts of Interest
Separation of Duties
Lipner model
Bell & Biba combined
Bell LaPadula
Write Up, Read Down
Confidentiality
Protection Profile
Common Criteria Term
Evaluation Assurance Level
Common Criteria Term
Target of Evaluation
Common Criteria Term
Security Target
Common Criteria Term
Security kernel protects…
The TCB
Stream cipher
Encrypts data-in-transit
Block ciphers encrypt…
Data in transit and data at rest
What type of encryption upholds all 4 goals of crypto?
Assymetric
IAAA Order
Identify
Authenticate
Authorize
Auditing (always happens)
AAA
EAP
PKI
Enterprise
Are all characteristics of…
802.1x
How many ISAKMP SA’s are created per protocol per connection?
2 (Initiator and responder)
Total 4 for ESP and AH
Product certification requirements
Tested by certification authority
Proven to fit security requirements of product owner
Product accredited
Data owner has chosen to implement system, even if there are vulnerabilities and risks.
Obfuscation type that makes code obscure to computer
Prevention obfuscation
Junk Bytes
Converting branches to jsr instructions
Combining try blocks with catch blocks
Prevention obfuscation techniques
Lexical obfuscation
Renaming classes, fields, and methods with new identifiers that lack intuitive meaning
Control flow obfuscation
Making the application harder to understand/decompile
Separating related structures and operations
Grouping unrelated structures and operations
Inserting unused or irrelevant code
Parallel code
Control flow obfuscation techniques
Variable modification
Array splitting
Bit shifting
Data obfuscation techniques
What type of BC/DR plan includes checklists?
DRP`
MTD
Maximum tolerable downtime
Circuit-level proxy firewall OSI Layer
Layer 5
Packet filter firewall OSI Layer
Layer 3 and Layer 4
ALE Caluclation
SLE x ARO
Who receives BCP training?
Everyone
Best method to sanitize SSD’s
Destruction
What is a concern with degausing?
Data remanence
zzuf
Fuzzer
Nikto
Web server scanner
Identification
Claiming an identity
802.1g Ad-hoc mode
P2P. Directly connects two clients (not through a AP)
Wireless stand-alone mode
Wireless network not connected to wired network.
Wireless Infrastructure mode
Connect endpoints to a central network. (Normal home wireless setup)
Wired extension mode
Connects wired networks via WAPs
PAT
NAT with Port numbers
Best protection for buffer overflow
Input validation
Microsoft SDL Design Phase
Decide how to implement security requirements.
Begin to identify threats.
Attack surface analysis and reduction
Threat modeling
CHAP periodically…
reauthenticates users
Encryption modes that don’t propagate errors
CTR, OFB
Weakest encryption mode
ECB
Best Encryption modes
- CTR
- OFB
When should risk transfer occur?
When the cost of insurance is less than the cost of the insured item.
Which is slower and cheaper? SRAM or DRAM?
DRAM
RAM type that stores more information
DRAM
What does SRAM use to store information?
Flip-flops
Minutiae refers to…
fingerprints
A digital signature encrypts…
the hash of a message
Which key is used to sign a message?
Senders private key
Which key is used to decrypt email?
Recipients private key
Corrective access control
Repair damage after a malicious event
CVSS Scoring order
Base
Temporal
Environmental
Who issues CVE numbers?
MITRE
Determining the cost-effectiveness of mitigating the potential harm or loss to a company
Risk Management
RTO
Amount of time to restore without unacceptable impact
Type 1 error
Valid subject is not authenticated
Type 2 error
Invalid subject is incorrectly authenticated
FISMA applies to…
Government contractors
Generational fuzzing aka…
Intelligent fuzzing
Generational fuzzing relies on…
Data models
What must the client perform before it can use the TGT?
Install the TGT
Decrypt the symmetric key using a hash of the users password
Database key that corresponds to a key in another table…
Foreign key
TCP PSH flag
Used to clear the buffer
Keyspace bit calculation
2 to the power of the number of bits
AAA protocol that provides authentication to remote devices
RADIUS
Access control model with “meaningful” permissions
RBAC
What are the two types of physical intrusion detection systems?
Electromechanical
Volumetric
Volumetric systems detect…
change to space of an environment
Security marking uses…
Human readable security attributes
What refers to security attributes for internal data structures?
Security labeling
Primary objective of physical security
Protecting peoples safety
Which side generates a high number port for a network connection? (Client or Server)
Client
MD5 and SHA-1 hash values
MD5: 128
SHA-1 160
Negative testing
Sending invalid information to an application
Positive testing
Tests if an app is working the way it should
CRUD testing
Test that database objects are creted correctly
Layer 5 protocols (2)
RPC
PAP
Exigent circumstances
Seize evidence without a warrant to protect it
Remote journaling
Remote database log
Capacitance
Monitors electromagnetic field
Abstraction
Hide implantation details for an object from the users of that object
Dirty Read
Reading a transaction that did not commit