Bucket List 1 Flashcards
What are some types of key escrow?
Dual knowledge, split key, dual key
What is OCSP?
Online certificate status protocol
What is the access controls NIST policy?
800-192
What is Public/private key, slow, subject to mitm, can provide CI/A
Asymmetric Encryption
What does a detective security control do?
Aids in discovery
What is a CA with PKI?
Certificate Authority, trusted third party, root authority
What is an unauthorized wireless router?
Rogue AP
Name the wireless authentication types and their encryption standards
WEP+RC4, WPA1+TKIP, WPA2+AES-CCMP
How do you secure DNS?
DNSSEC
Integrity, detects changes, non-reversible
Hashing
What is often the biggest threat?
Disgruntled employee, personnel
What is a non-water fire suppression chemical?
FM-200
What is the certificate standard
X.509v3
Who creates data, is accountable for the data?
Data owner
What is the credential management NIST policy?
800-63
In risk, what is AV?
Asset value
What is the formula for a single loss?
AV * EF, asset value times exposure factor
What security control will stop an event?
Preventative
What does AUP stand for?
Acceptable use policy
What does JOA stand for?
Joint operating agreement
In risk, what is ALE?
Annual loss expectancy
What is multiple defenses called
Defense in depth
What type of testing is external and potentially harmful
penetration testing
What are the SNMP passwords and what are they called?
Public/Private and community strings
How far will an ethernet cable successfully carry data?
100M
What is the difference between due care and due diligence.
Due care are actions and approaches that are owed to the customer.
Due diligence is a research and study to ensure due care is properly being taken.
What is an RA with PKI?
Recovery agent, someone who can get the keys.
Registration authority, someone who registers certs on your behalf.
What is EER in encryption?
Asymmetric Encryption, El-Gamal, ECC, RSA,
What are four written aspects of governance
Policy, Procedures, Guidelines, Standards
What is the security controls NIST policy?
800-53
What are the ways to handle risk?
Avoid, Mitigate, Accept, Transfer, Ignore
What is used to aid encryption in IPSEC
CTR / counter mode
Who maintains the infrastructure of the data and is responsible, but not accountable, for the data?
Data Custodian
What is the training NIST policy?
800-50
What does MOU stand for?
Memorandum of understanding
What are the best practices of governance?
Guidelines
What security control reduces likelihood?
Deterrent
What does ARP bind?
IP to MAC
What NIST policy is Managing Information Security Risk?
800-39
What is X.509v3
Certificate standard
What does EULA stand for?
End user license agreement
What is the name of the act discussing dual use items
Wassenaar
Way to protect Asymmetric Encryption?
Initialization Vector