Bucket List 2 Flashcards
What are the four cloud architecture types?
Private, Public, Community, Hybrid
What is 802.1P
qos/priority
What are the steps to the penetration testing methodology?
Plan, Discover, Attack, Report
What is quality control?
The focus is on the quality of the product after it has been created, it is reactive.
In forensics, what is the order of volatility mean?
Capture most volatile, short term memory first?
Which layer is TCP/UDP at?
Layer 4, Transport
What filters network traffic?
Firewall
Which layer is best for encryption, https?
Layer 7, Applcation
What is the difference between HMAC and a Digital Signature?
HMAC - both parties need the same key, Digial Sig is public/private key
What are the types of cloud offerings?
PaaS IaaS NaaS SaaS IDaaS SecaaS
What are the characteristics of cloud?
BRROMM - Broad network access Rapid elasticity Resource pooling On demand self service Measured service Multi-tenancy
Which security model is focused on creation, ownership, and the 8 basic rights?
Graham-Denning
What is quality assurance?
The big picture of process involving quality, it is proactive.
Ensure the process of making a product has high quality.
Which security model is write up / read down?
Bell-LaPadula
What does does Radius authentication make use of?
Certificates
Which layer contains hubs?
Layer 1, Physical
What is a smurf attack?
Directed broadcast using PING / ICMP
Which layer contains IP
Layer 3, Network
What are the steps to incident management?
DR MRRRL Detection Response Mitigation Reporting Recovery Remediation Lessons Learned
What is Kerkhoff’s Principle?
That any cryptographic system should be secure if every part of it is public except for the key.
Which part of CIA is threatened by DDOS or ransomware?
Availability
What are the three keys of biometric accuracy?
Type 1 - FRR - False Rejection Rate
Type 2 - FAR - False Acceptance Rate
CER - Crossover Error Rate
What is the A in ACID and what does it mean?
Atomicity - that a transaction must fully complete or not go through at all
What is the least effective type of media sanitation?
Clearing
Which access control is based on rules?
RBAC
Which security model focuses on subject-program-rights?
Clark-Wilson
Which access control is the least strict?
DAC
What helps achieve the A in CIA
Redundancy
Which part of CIA is threatened by unintended data change?
Integrity
What access control is based upon tags on records?
ABAC
What is Linus’ law?
Sufficient eyeballs looking at code will make all bugs become apparent.
Which is proactive, QA or QC?
QA
What are four types of VPN?
IPSec, L2TP, PPTP, HTTPS
Which security model is focused on constraining data?
Clark-Wilson
Which IP version contains Anycast?
IPv6
Which layer contains bits?
Layer 1, Physical