Areas of focus Flashcards

1
Q

An authentication mechanism that involves receiving a one-time use shared secret password that does expire

A

Time-based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Command used in forensic data acquisition to forensically create a bit by bit copy of a hard drive to a disk image

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GNU Privacy Guard (GPG)

A

Asymmetric - A newer and updated version of the PGP encryption suite that uses AES for its symmetric encryption functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blowfish

A

Symmetric - Block cipher that uses 64-bit blocks and a variable length encryption key to encrypt plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

International Data Encryption Algorithm (IDEA) -

A

Symmetric - block cipher which uses 64-bit blocks to encrypt plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Elliptic Curve Cryptography (ECC)

A

Asymmetric - Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys. With a 256-bit key is just as secure as RSA with a 2048-bit key. Most commonly used for mobile devices and low-power computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Algorithms are known as…

A

Public Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Triple DES (3DES) -

A

Symmetric - Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to perform the sanitization of flash-based devices such as SSDs or USB devices

A

Secure Erase utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network traffic filter that controls incoming and outgoing traffic.

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The order of volatility for evidence collection

A

Processor cache, RAM, Swap File, Hard/removable drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Primary role is to ensure that the organization processes sensitive personal data in compliance with applicable data protection rules

A

Data protection officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Overwriting a storage device by setting all bits to the value of zero. Not as effective on SSDs or hybrid drives, and takes a longer amount of time.

A

Zero-fill utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An access model that is controlled by the system but utilizes a set of permissions instead of a single data label to define the permission level

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Algorithm that creates a fixed-length 160-bit hash value unique to the input file

A

Secure Hash Algorithm (SHA-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when the outcome from an execution process is directly dependent on the order and timing of certain events. Those events fail to execute in the order and timing intended by the developer

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Diffie-Hellman

A

Asymmetric - Used to conduct key exchanges and secure key distribution over an unsecured network. Used for the establishment of a VPN tunnel using IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Twofish

A

Symmetric - block cipher that replaced blowfish and uses 128-bit blocks and a 128-bit, 192-bit, or 256-bit encryption key to encrypt plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques

A

Purging (Sanitizing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Rivest Cipher (RC4)

A

Symmetric - stream cipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A software development method where application and platform requirements are frequently tested and validated for immediate availability. A human is still required to approve the release into the production environment.

A

Continuous Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Database used for managing the entities in a communication network

A

Management information base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion: Recon, Weaponization, Delivery, Exploitation, Installation, C2, Actions on Objectives

A

Kill Chain Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A knowledge base maintained for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures

A

MITRE ATT&CK Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An approach to computer security that attempts to unify endpoint security technology such as AV and host intrusion prevention, user or system authentication, and network security enforcement.

A

Network Access Control

26
Q

A device that looks like a USB thumb drive and is used as a software key in cryptography

A

Pluggable Authentication Module

27
Q

Algorithm that creates a fixed-length 128-bit hash value unique to the input file

A

Message Digest 5 (MD5)

28
Q

Form of access control where the original creator of the resource is considered the owner and can then assign permissions and ownership to others. The most flexible model and is currently implemented in Windows, Unix, Linux and macOS systems

A

Discretionary Access Control

29
Q

A senior role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset. Responsible for labeling the asset and ensuring that it is protected with appropriate controls

A

Data owner

30
Q

Tool used to display all current TCP/IP network configurations on a Windows system

A

ipconfig

31
Q

Utilizes complex mathematics to create sets of objects and
subjects to define how they interact

A

Lattice-based Access Control

32
Q

Commaned used to display and troubleshoot DNS records

A

nslookup

33
Q

Pretty Good Privacy (PGP)

A

Asymmetric - An encryption program used for signing, encrypting, and decrypting emails. Used by IDEA algorithm.

34
Q

Sanitizes a self-encrypting drive by erasing the media encryption key and then reimaging the drive.

A

Cryptographic Erase utility

35
Q

Disposal technique that uses only logical techniques to remove data, such as overwriting a hard drive with a random series of ones and zeros. Some tools may be able to recover data.

A

Clear or Clearing

36
Q

Protocol used to collect information about CPU utilization and memory usage from network devices

A

SNMP

37
Q

DLP concept where pattern matching technique uses a structured database of string values to detect matches.

A

Exact data match - think SSNs xxx-xx-xxxx

38
Q

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim. Uses graphical depictions

A

Diamond Model of Intrusion Analysis

39
Q

Data Encryption Standard (DES)

A

Symmetric - Encryption algorithm which breaks the input into 64-bit blocks and uses transposition and substitution to create ciphertext using an effective key strength of only 56-bits

40
Q

Exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive

A

Degaussing

41
Q

Command used to display the network address and subnet mask for the wired network connection on a Linux system

A

ip

42
Q

Advanced Encryption Standard (AES)

A

Symmetric - Symmetric block cipher that uses 128-bit, 192-bit, or 256-bit blocks and a matching encryption key size to encrypt plaintext into ciphertext. The standard used for U.S. government data

43
Q

A role focused on the quality of the data and associated metadata

A

Data steward

44
Q

Used to encrypt multiple bits at a time before moving to the next set of data. Generally have fixed lengths.

A

Block cipher

45
Q

A hardware-based cryptographic processing component that is a part of the motherboard.

A

Trusted Platform Module

46
Q

Provides multiple security features such as anti-virus, anti-spam, content filtering and web filtering in a single device or network appliance

A

Unified Threat Management

47
Q

RSA

A

Asymmetric - Algorithm that relies on the mathematical difficulty of factoring large prime numbers. Widely used for key exchange, encryption, and digital signatures. Can use key sizes of 1024-bits to 4096-bits

48
Q

Attempts to access a pointer that references an object at a particular memory location

A

Dereferencing

49
Q

A role responsible for handling the management of the system on which the data assets are stored

A

Data Controller/Custodian

50
Q

A software development method where application and platform updates are committed to production rapidly. Focuses on automated testing of code in order to get it ready for release. Test and release process into the production environment is automated, making the changes available for immediate release once the code is committed.

A

Continuous Deployment

51
Q

An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

A

Cyclical Redundancy Check

52
Q

Containment strategy accomplished by means of achieving the isolation of a host or group of hosts using network technologies and architecture.

A

Segmentation

53
Q

Tool used for capturing Windows memory data for forensic analysis

A

Memdump

54
Q

A software development method where code updates are tested and committed to a development or build server/code repository rapidly. Allows for testing and committing updates multiple times per day.

A

Continuous Integration

55
Q

Encrypts a single bit or byte at a time during the encryption process.

A

Steam cipher

56
Q

An access model that is dynamic and context-aware using IF-THEN statements. Provides the most detailed and explicit type of access control over a resource.

A

Attribute-Based Access Control (ABAC)

57
Q

Containment strategy that involves removing an affected component from whatever larger environment it is a part of.

A

Isolation

58
Q

An identity and access management control that relies upon using a certificate-based authentication mechanism

A

Smart cards - including PIV (personal identify verification) and CAC (common access control) devices.

59
Q

An authentication mechanism that involves receiving a one-time use shared secret password, usually through a token-based key fob or smartphone app that does not expire

A

HMAC-based One-time Password (HOTP)

60
Q

Command used to display network statistics

A

netstat

61
Q

An access control policy where the computer system determines the access control for an object. Relies on security labels being assigned to every user (called a subject) and every file/folder/device or network connection (called an object). Data labels create trust levels for all subjects and objects.

A

Mandatory Access Control (MAC) - Implemented through the Rule-based and the Lattice-based access control methods. THE STRONGEST LEVEL OF PROTECTION

62
Q

Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label

A

Rule-based Access Control (NOT RBAC)