Chapter 1 Mastering Security Basics Flashcards

Use Case, Access Control, Hashing etc

1
Q

What is a “Use Case”?

A

A “Use Case” describes a goal that an organization wants to achieve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________prevents the unauthorized disclosure of data.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______scrambles data to make it unreadable by unauthorized personnel.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key elements of access controls?

A

Identification, authentication, authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stegnaography is a method of confidentiality.

A

Stegnaography obscures the data and can be used in a use case to support obfuscation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is obfuscation?

A

to make something unclear of difficult to understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hiding data in plain sight is referred to as

A

steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to provide assurance that data has not changed or been modified or corrupted.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can integrity be enforced with data?

A

hashing techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of hashing algorithms?

A

Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Hash-based Message Authentication Code (HMAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC has three different meanings..

A

Media access control, Mandatory access control, Message authentication code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do digital signatures ensure?

A

authentication, non-repudiation and prevents attackers from impersonating others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability indicates that data and services are available when needed.

A

Organizations commonly implement redundancy and fault-tolerant methods to ensure availability for key systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is redundancy important?

A

it adds duplication to critical systems and provides fault tolerance. continue service with no interruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SPOF mean?

A

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the common goal of fault tolerance and redundancy?

A

to remove single point of failure (SPOF)

17
Q

______the possibility of a threat exploiting a vulnerability and resulting in a loss

A

Risk

18
Q

_______can occur if personnel in a organization don’t manage the VMs correctly.

A

VM sprawl

19
Q

Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following best describe the purpose of his actions?

A

support obfuscation

20
Q

_______allow an attacker to access the host system from the VM.

A

VM escape attacks

21
Q

_________the state of a VM at a moment in time.

A

Snapshot

22
Q

_________ a specialized version of a Type II hypervisor that has use the kernal of the host.

A

Container virtualization

23
Q

__________ runs as a software within a host operating system

A

Type II Hypervisor

24
Q

_______run directly on the system hardware.

A

Type I Hypervisor

25
Q

________reduces risk by reducing the chanes that a threat will exploit a vulnerability or by reducing the impact of the risk.

A

Risk mitigation

26
Q

What are the three primary security control types

A

technical, administrative, physical

27
Q

Additional control methods are

A

corrective, preventive, detective, compensating,and deterrent

28
Q

You run command-line tools in the command Prompt window in Windows and terminal in Linux

A

Ping command is used to check connectivity, name resolution, verify routers, firewalls, and intrusion prevention block ICMP

29
Q

ipconfig command on Windows allows you to view configuration of network interfaces.

A

Linux uses “ifconfig and ip” to view and change configurations of a network interfaces.

30
Q

You can enable promiscuous mode on a NIC with ifconfig

A

Netstat allows you to view statistics for TCP/IP protocols and view all active network connections.

31
Q

Netstat is useful if you suspect malware is causing a computer to connect with a remote computer

A

Tracert list the router or hops between two systems and verify a path has not changed

32
Q

The arp command allows you to view and manipulate the ARP cache.

A

ARP can be useful if you suspect a system’s ARP cache has been modified during an attack.

33
Q

What does ARP stand for?

A

Address Resolution Protocol

34
Q

One benefit of using a VDI/ VDE is that user PCs can have limited hardware resources. If the PC can connect to a server over a network, it can run a full-featured desktop operating system from the server.

A

In a persistent virtual desktop, each user has a custom desktop image.

35
Q

Virtual desktops that support non-persistence serve the same desktop for all users. When a user accesses the remote server, it provides a desktop operating system from a preconfigured snapshot.

A

Although non-persistent users can make changes to the desktop as they’re using it, it reverts to a known state (the original snapshot) when they log off.

36
Q

ipconfig /all. This command shows a comprehensive listing of TCP/ IP configuration information for each NIC. It includes the media access control (MAC) address, the address of assigned DNS servers, and the address of a Dynamic Host Configuration Protocol (DHCP) server if the system is a DHCP client. You can use ifconfig-a on Linux systems.

A

ipconfig /displaydns. Each time a system queries DNS to resolve a host name to an IP address, it stores the result in the DNS cache and this command shows the contents of the DNS cache. It also shows any host name to IP address mappings included in the hosts file.

37
Q

ipconfig /flushdns. You can erase the contents of the DNS cache with this command. Use this when the cache has incorrect information and you want to ensure that DNS is queried for up-to-date information.

A

Netstat. Displays a listing of all open TCP connections.

38
Q

Netstat-a. Displays a listing of all TCP and User Datagram Protocol (UDP) ports that a system is listening on, in addition to all open connections.

A

Netstat–r. Displays the routing table.

• Netstat-e. Displays details on network statistics, including how many bytes the system sent and received.

Netstat-s. Displays statistics of packets sent or received for specific protocols, such as IP, ICMP, TCP, and UDP.

39
Q

Netstat-p protocol. Shows statistics on a specific protocol, such as TCP or UDP. For example, you could use netstat-p tcp to show only TCP statistics.

A

Network administrators typically use tracert to identify faulty routers on the network.