CASP Flashcards

1
Q

What is an IDS

A

Intrusion Detection System- a system that monitors traffic that transverses a network segment in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of IDS’s

A

Host Based and Network Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Network Intrusion Prevention System (NIPS)

A

A
network security/threat prevention technology that examines network traffic to detect and prevent exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Web Application Firewall (WAF)

A

An appliance, plug in, or filter that applies a set of rules to an HTTP connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the types of WAF’s

A

1.Appliance Based
2.Cloud Based
3.Code Integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the WAF modes

A

1.Positive Mode
2. Negative Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Network Access Control (NAC)?

A

Steps taken to ensure that all security standards are met prior to connecting a device to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the NAC types?

A
  1. Infrastructure
  2. Endpoint
  3. Hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of Domain Name Server Security Extensions
(DNSSEC)?

A

Provides integrity and authentication
for DNS responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network Address Translation (NAT)?

A

A method of mapping an
IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the NAT types?

A
  1. Full-Cone
    2.Address-Restricted-Cone
  2. Port-Restricted-Cone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of Proxies?

A
  1. Forward
  2. Reverse
  3. Anonymous
    4.Transparent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of an Apllication Programing Interface (API)?

A

It allows two applications to communicate with one another to access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Virtual Private Cloud (VPC)?

A

A virtual version of a physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of Cloud Computing?

A
  1. Private
  2. Public
  3. Community
  4. Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Federation in reference to networks?

A

The trust relationship that exists
between organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Vertical Scaling?

A

Adding additional
resources to a system so that it meets demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Horizontal Scaling?

A

Adding
additional nodes or machines to your infrastructure to
cope with new demands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the Development Approaches?

A
  1. DevSecOps
  2. Agile
  3. Waterfall
  4. Spiral
  5. Versioning
  6. Continuous Integration/Continuous delivery (CI/CD)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Waterfall Method?

A

A less flexible process in which development requires formal reviews
before moving into the next
phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Spiral Method?

A

A nested version of waterfall method
where the estimated costs and schedules are revised at the end of each risk assessmed

22
Q

What is Continuous Integration/Continuous Delivery
(CI/CD) Pipelines method ?

A

A series of steps that include all the stages from the start of the CI/CD process responsible for creating seamless software delivery

23
Q

What is Virtual Desktop Infrastructure (VDI)?

A

The process of running a user desktop inside a virtual machine that lives on a server in the datacenter.

24
Q

What is the function of DIAMETER?

A

Replaces RADIUS but is not compatible with RADIUS. Provides better performance and encryption.

25
Q

What is Kerberos?

A

The default authentication protocol for windows based single sign on.

26
Q

What are the Authentication Factors?

A
  1. Something you Know (knowledge factor)
  2. Something you have (ownership factor)
  3. Something you are (characteristics factor)
  4. Somewhere you are (location factor)
  5. Something you do (action factor)
27
Q

What is Single Sign On (SSO)?

A

It allows a user to login once and access all appropriate network resources.

28
Q

What is JSON?

A

JavaScript object notation.

29
Q

What is Virtual Desktop Infrastructure (VDI)?

A

Remote desktop services architectures that provide the flexibility to work anywhere.

30
Q

What are the 3 models of VDI?

A
  1. Centralized
  2. Hosted
  3. Remote Virtual Desktop
31
Q

What is Middleware?

A

Software that provides common
services and capabilities to applications outside of what’s offered by the operating system.

32
Q

What are the types of privelage escalation?

A
  1. Vertical
  2. Horizontal
33
Q

What is Database Activity Monitor (DAM)?

A

Tools that monitor, capture, and record database events in near real-time and provides alerts about security violations.

34
Q

What are the 3 models of DAM?

A
  1. Interception Based
  2. Memory Based
  3. Log Based
35
Q

What is the RFC that sets aside IP Addresses for NAT?

A

RFC 1918

36
Q

What is a UTM?

A

Unified Threat Management- All in one security that bundles multiple security functions into one appliance.

37
Q

What is API?

A

Application Programming Interface- Allows two apps to communicate each other to access data.

38
Q

What are the types of Mobile Schemes?

A
  1. COBO (Company-Owned Business Only)
  2. COPE (Company-Owned Personal Enabled)
  3. CYOD (Choose Your Own Device)
  4. POCE (Personally Owned Corporate Enabled)
  5. BYOD (Bring Your Own Device)
39
Q

What is resilience?

A

Resilience is the process and outcome of successfully adapting.

40
Q

What is redundancy?

A

The inclusion of extra components in case of failure in other components.

41
Q

What is whitebox testing?

A

Static Application Security
Testing (SAST)- code based testing.

42
Q

What is black box testing?

A

Dynamic Application Security Testing (DAST)- functional testing.

43
Q

What is Fault Tolerance?

A

A process that enables an operating system to respond to a failure in hardware or software.

44
Q

What are the gateway protocols?

A
  1. RIP
  2. OSPF
  3. BGP
45
Q

Why are the 3 SDN Planes?

A
  1. Control
  2. Data
  3. Application
46
Q

What is an Unsecure Direct Object Reference?

A

Pages or services allow requests to be made to specific objects without the proper verification of the requestor’s right to the content.

47
Q

What are the goals of pentesting?

A
  1. Determine if there is a vulnerability that can be exploited via blind test.
  2. Determine if the target’s is able to detect and respond to the attack via double blind test
48
Q

What are the types of Pentest teams?

A
  1. Red- attackers
  2. Blue Defenders
  3. White- Referees
49
Q

What are the types of Privilege Escalation?

A
  1. Vertical
  2. Horizontal
50
Q

What are SCADA systems?

A

Supervisory Control And Data
Acquisitions- Systems that monitor utilities and control power distribution.

51
Q

What is the Certificate Revocation List?

A

A list that Identifies certificates that
have been revoked due to fraud, theft, change in name or relationship with
the CA.

52
Q

What is SE Linux?

A

Linux Kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls(MAC).