CEHv10 Flashcards
What is preventative control?
Controls in place to prevent something from occurring. A smart card could be preventative meassure
What is Corrective control
An attempt to correct an issue. Like antivirus attempting to remove malware.
What is Registration Authority
The registration authority (RA) is the entity responsible for receiving certificate request, identifying the subject and requesting the CA to issue a certificate.
what is the OCSP?
Online Certificate Status Protocol. Obtains revocation status of X.509 certificates
What does the Verification Authority (VA) do?
Validates the identity of a subject when a certificate is used.
What does a CA Certificate Authority do?
Issues certificates based on requests from the RA
What does SOAP do?
Simple Object Access Protocol. Is platform independent, simplifies communication and leverages multiple transport protocols.
Not faster then CORBA because it utilizes XML which takes longer then binary.
What is CORBA?
Common Object Request Broker Architect. A standard defined by the object management group (OMG). Designed to facilitate the communication of systems that are deployed on diverse platforms
What is IPChains
A firewall on older linux kernels up to verion 2.2x
Has the ability to filter packet fragments.
What is IPTables
A linux firewall that replaced IPChains from Linux kernel version 2.4x and above
What is ipfwadm?
An older linux firewall replaced by IPChains.
What are the 3 types of the Web Application Architecture
- Client or presentation layer - The frontend of the application.
- Business logic layer - Controls how the application works.
- Database Layer - Handles and stores data required by the application.
What is een alternate data stream
Hiding data in existing files
True statements regarding whitfiled diffie and martin hellman.
- The algo named after them performs encryption
2. They invented Public Key Encryption
What is the NMAP TCP Connect scan?
Peforms a full tcp connection or completes the full tcp handshake. It is very easy to detect on the hosts being scanned.
what can a network vulnerability scanner not do?
Scan through a firewall.
What are the 8 steps of a CEH scanning methodology
- check for live systems
- check for open ports
- check beyond the IDS
- Grab banners
- Scan for vulnerabilities
- Draw network diagrams
- prepare proxies
- Pen test the network for scanning vulnerabilities.
Describe an N-Tier architecture
Each server performs a single and unique role in the group. Web-server, database server and application server.
Describe service-oriented architecture (SOA)
The components provide a service to other components via a communication protocol.
What is seperation of duties
A security concepts that prescribes breaking operatino int parts and assign the parts to individuals to prevent fraud.
What is Dual control
I requeres 2 individuals to be present to perform a sensitive operation. Like missile launch.
What is OWASP
Testing methodologies to address security controls
What is OWASP top 10 proactive controls?
- verify security early and often
- parameterize queries
- encode data.
- validate inputs.
- implement identity and authentication controls
- implement appropriate access controls
- protect data
- implement logging and intrusion detection
- leverage security frameworks and libraries
- implement error and exception handling
What is NIST
National Institute of Standards and Technology. valt onder de amerikaanse overheid en zet zich in voor standaardisatie in de wetenschap.
what are the dom objects for a javascript XSS defacment attack?
getElemenetByID()
getElementsByTagName()
Wat zijn de 7 lagen van het OSI model?
- Toepassing - DATA
- Presentatie - DATA
- Sessie - DATA
- Transport - Segmenten
- Netwerk - Paketten
- Datalink - Frames
- Fysiek - Bits
TCP Session Hijack
Transport Layer attack. Layer 4 OSI
MAC Spoofing
Data layer attack. Layer 2 OSI
ICMP flooding
Network layer attack. Layer 3 OSI
Telnet DoS attack
Session layer attack. Layer 5 OSI
What is PCI DSS Standard
Payment Card Industry - Data Security Standard
What are the steps of an incident management process
- prepare for incident handling and response
- detect and analyze
- classify and prioritize
- notify
- contain
- investigate
- eradicate and recover
- perform post-incident activities
what are the core components of Metasploit
- libraries
- modules
- interfaces
CSIRT
Computer Security Incident Response Team. Provides incident response services to users and organization, government agency in partnership with homeland security.
NIST
National Institute of Standards and Technology. a non-regulatory agency of the united states department of commerce.
What is a bastion host?
A gateway between an inside and an outside network located on the public side of the dmz and is designed to protect against attacks aimed at the inside network.
Name 3 anonymizers
proxify
psiphon
tor
Name the ISO Standards and what they do
27000 outlines how to best secure a large organization
27001 describes how to perform a risk assessment
27002 describes how to apply security controls after performing the risk assessment described in ISO 27001
27005 describes how to best manage security risks using an organized and systematic approach
27006 describes audits and certifications for security management systems.
What is the purpose of a Mole tool?
To automate sql injection attacks
What is Cain and Able
A password recovery tool for windows
What is DataThief
A program to reverse engineer data points from a graph
What is Netcat
A tool to read and write data across the network using tcp or udp protocols. Netcat is commonly embedded in Trojan Payloads.
Which statements are true of ARP?
- maps 48 bit addresses to 32 bit addresses
2. prone to man in the middle attacks.
Name the Security Laws and Standards
PCI-DSS - Payment Card Industry Data Security Standard
ISO 27001
HIPAA - Health Insurrance Portability and Accountability Act
SOX - Sarbane-Oxley Act 2002 _ Financial institutes like ABN Amro of Wallstreet
DMCA - Digital Millenium Copyright Act
FISMA - Federal Information Security Management Act
What are the 9 Security Policy Creation Steps
- Risk Assesment
- Use security standards and Frameworks as guide
- Get management and staff input
- enforce the policy. Use penalties for non-compliance
- Publish final draft
- Have all staff read/sign that they understood the policy
- employ tools to help enforce policy
- staff training
- review and update regularly
What is the Vulnerability Life Cycle
Baseline - Vulnerability assesment - Risk assessment - Remediate - Verify - Monitor - Baseline