Bucket List 2 Flashcards

1
Q

What are the four cloud architecture types?

A

Private, Public, Community, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.1P

A

qos/priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps to the penetration testing methodology?

A

Plan, Discover, Attack, Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is quality control?

A

The focus is on the quality of the product after it has been created, it is reactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In forensics, what is the order of volatility mean?

A

Capture most volatile, short term memory first?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which layer is TCP/UDP at?

A

Layer 4, Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What filters network traffic?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer is best for encryption, https?

A

Layer 7, Applcation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between HMAC and a Digital Signature?

A

HMAC - both parties need the same key, Digial Sig is public/private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of cloud offerings?

A
PaaS
IaaS
NaaS
SaaS
IDaaS
SecaaS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of cloud?

A
BRROMM - 
Broad network access
Rapid elasticity
Resource pooling
On demand self service
Measured service
Multi-tenancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security model is focused on creation, ownership, and the 8 basic rights?

A

Graham-Denning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is quality assurance?

A

The big picture of process involving quality, it is proactive.
Ensure the process of making a product has high quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which security model is write up / read down?

A

Bell-LaPadula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does does Radius authentication make use of?

A

Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which layer contains hubs?

A

Layer 1, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a smurf attack?

A

Directed broadcast using PING / ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which layer contains IP

A

Layer 3, Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the steps to incident management?

A
DR MRRRL
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Kerkhoff’s Principle?

A

That any cryptographic system should be secure if every part of it is public except for the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which part of CIA is threatened by DDOS or ransomware?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three keys of biometric accuracy?

A

Type 1 - FRR - False Rejection Rate
Type 2 - FAR - False Acceptance Rate
CER - Crossover Error Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the A in ACID and what does it mean?

A

Atomicity - that a transaction must fully complete or not go through at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the least effective type of media sanitation?

A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which access control is based on rules?
RBAC
26
Which security model focuses on subject-program-rights?
Clark-Wilson
27
Which access control is the least strict?
DAC
28
What helps achieve the A in CIA
Redundancy
29
Which part of CIA is threatened by unintended data change?
Integrity
30
What access control is based upon tags on records?
ABAC
31
What is Linus' law?
Sufficient eyeballs looking at code will make all bugs become apparent.
32
Which is proactive, QA or QC?
QA
33
What are four types of VPN?
IPSec, L2TP, PPTP, HTTPS
34
Which security model is focused on constraining data?
Clark-Wilson
35
Which IP version contains Anycast?
IPv6
36
Which layer contains bits?
Layer 1, Physical
37
What is a documented method of media destruction?
Defensible destruction
38
What is an HMAC?
Hashed Message Authentication Code, it provides authentication and integrity, it is fast, both parties need a key.
39
Which layer contains switches?
Layer 2, Data link
40
What are the layers of the OSI model?
``` Physical Data Network Transport Session Presentation Application ```
41
What type of media sanitation removes data without hope of recovery, but the media remains usable?
Purging
42
What type of controls do Firewalls vs Routers impose?
Firewall - rules, Router - ACLs
43
What's the best way to protect applications?
WAF / Application Proxy
44
List memory in the order of volatility.
``` Cache Level 1 Cache Level 2 RAM SSD / USB HDD TAPE ```
45
Which is a EU version of an authentication server?
Diameter
46
Which access control is the most strict?
MAC
47
Which part of CIA is threatened by information leakage, sniffing, or protocol analysis?
Confidentiality
48
What is 802.3
ethernet
49
Which layer contains routers?
Layer 3 , Network
50
What helps achieve the I in CIA
Hashing
51
Which is the most accurate biometric?
Iris
52
What is 802.1Q
VLANs
53
Which layer contains VLANS?
Layer 2, Data Link
54
What are 4 authentication servers
Kerberos, Radius, Diameter, TACACS
55
What are the characteristics of IPv6?
Unicast, Multicast, Anycast, 128 bit address, ipsec on by default
56
What are the characteristics of IPv4?
Unicast, Multicast, Broadcast, 32 bit address
57
What form of authentication does Kerberos use?
Tickets
58
Which authentication server is best?
Kerberos
59
What form of authentication does TACACS use?
Acces list, ACL
60
Which layer contains packets?
Layer 3, Network
61
What is the port security standard?
802.1x
62
What function of IPv4 is stopped by routers?
Broadcast
63
How many bits is IPv4 and IPv6?
32 and 128
64
Which security model is read up / write down?
Biba
65
What is the difference in verification and validation?
Verification means that it meets specifications. Validation means that the specifications are correct.
66
Which security model is based on object, subject, and rights?
Grahm-Denning
67
What are three types of media sanitization?
Overwrite, degauss, encryption
68
What is the QOS / priority protocol?
802.1P
69
What are some outdated routing protocols?
RIP, RIPv2
70
Which is reactive, QA or QC?
QC
71
What is the spanning tree protocol standasrd?
802.1D
72
Which layer contains segments?
Layer 4, Transport
73
What is the vlan protocol?
802.1Q
74
Which security model requires transactions to be signed off by a third party?
Clark-Wilson
75
What are the types of fire extinguishers?
``` ACBDK Ash - paper Current - electric Boiling - flammable liquid Dynamite - explosive Kitchen - grease ```
76
What are the requirements for forensic evidence have?
COAA - Comprehensive, Objective, Accurate, Admissible
77
What is 802.1D
spanning tree / loops
78
Which access control is based on roles?
RBAC
79
What is defensible destruction?
Documented proof that you've destroyed something.
80
What does ACID mean?
Atomicity Consistency Integrity Durability
81
Which authentication service involves tickets?
Kerberos
82
Which authentication service involves certificates?
Radius
83
What is the ethernet protocol?
802.3
84
What are Cisco specific routing protocols?
IGRP, EIGRP
85
What are the current routing protocols?
BGP, OSPF
86
Which layer contains frames?
Layer 2, Data Link
87
What is 802.1x
Port security
88
What does CIA stand for?
Confidentiality, Integrity, Availability
89
What helps achieve the C in CIA
Encryption
90
Which security model helps prevent conflict of interest?
Brewer-Nash
91
Which security model is based on preventing a subject from seeing certain objects?
HRU, Harrison, Ruzzo, Ullman