CISSP Domain 5 Flashcards

1
Q

Synchronous dynamic password tokens

A

Time based synchronised with authentication server

Generate pin periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asynchronous dynamic password tokens

A

Generates pin based on an algorithm+Incrementing counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Face scan

A

Geometric pattern of faces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fingerprint

A

Visible pattern in hands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Retina scans and accuracy level ?

A

Focus onpattern of blood vessels at back of eye

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Iris scans and accuracy level .?

A

Coloured area around the pupil ( second most accurate after retina)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 types of OTP

A

HOTP : Uses hmac to create OTP of 6 digits

Valid until used

TOTP: Timestamp and remains valid for certain time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Service account and how to manage password

A

Non user account
Password to be changed manually
Configure it to be non interactive for user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Directory services

A

Centralised database that includes into of Subject and object including authentication data

Based on LDAP services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security domain and how can trust be established?

A

collection of subjects and objects that share a common security policy

Trusts are established can be one way or two way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Federated identity management and can you give examples of cloud based FIM

A

Sso is common in internal network but can be implemented in external using FIM

Cloud based - udemy, LinkedIn

Works on trust relationship between: User, IdP and service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of FIM

A

On premise

Cloud

Hybrid

Just in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Just in time

A

Food app in CG offer not only food but other benefits

Exchange of data happens from CG to food using SAML

Ephemeral or broker and remove access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Excessive Prevlige Vs prevlige creep

A

More than what is required

Accumulation of prevlige

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Identity management implementation techniques

A

Centralised access control - Single entity performs all Authorization verification - GAS

Decentralised access control- Various entities located throughout perform Authorization verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kerberos steps

A
  1. Client requests access to Kerberos environment
  2. Client sends username to TGT ( Authentication service) - Domain controller
  3. AS encrypts TGT with clients password
  4. Only the client can decrypt TGT using password
  5. Enters Realm with TGT
  6. Client sends request to TGS to access printer
  7. Verifies TGT and grants a Ticket
  8. Cool thing about this ticket:
    -2 copies of the exact same session key

Key 1: Encrypted with clients password
Key 2:Print server password

  1. Only the print server can decrypt the session key using its password
  2. This proves the client has been authenticated and can establish a session to fulfill the desired requirement of client -Mutual authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Secured network design - Bastion host, screened host and subnet

A

Bastion host: Exposed to the internet but Hardened

Screened host: Firewall protected system logically positioned inside network

Screened subnet : 3 way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Vertical prevlige escalation

A

Greater privilege than what is required like admin privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Horizontal prevlige

A

Lateral movement that is access other computers within the network

20
Q

Mimikatz

A

Attackers use this tool to gain admin and then vertical privilege

21
Q

Salt

A

Adding random values to a password before it’s hashed

22
Q

Pepper

A

Salt is still in db along with hash adding pepper increases security which is large constant values stored in server or app code

23
Q

Sniffing attack

A

Captures information (packet) traveling across the network

24
Q

What is the purpose of implementing sso ?

A

You should never give your credentials to third party instead use SAML, open Id OAuth, OIDC to solve this problem

They share AA and profile info with third party

25
Q

XML

A

Data will be in multiple format XML standardizes it by using common language to share information between vendors

26
Q

SAML, 3 entities

A

XML based standard to exchange information about Authentication and Authorization attributes information information between federated organisations. Provides SSO capabilities

Service provider, Principal, identity provider

Used in AD

27
Q

In SAML IdP can send 3 types of XML messages ( Assertions)

A

Authentication assertion

Authorization assertion

Attributes assertion

28
Q

O Auth

A

Authorization framework not Authentication protocols

It exchanges API messages and uses a token to show that access is authorised

29
Q

Open ID

A

Provides decentralised authentication allowing users to log into multiple unrelated websites with one set of credentials maintained by open ID provider

User to enter open ID identifier whereas others it happens backend

30
Q

OIDC

A

Authentication layer which users OAuth 2.0 Authorization framework

It provides both authentication and authorisation

Google account to login to LinkedIn

Uses JSON

31
Q

Risk based access control

A

Risk based decision based on availability of data

Evaluates the environment , situation and security policies

Sometime uses binary rules to control access

32
Q

MAC and 3 types of environment

A

Based on label (security clearance) and security Domain

User would need both label and security Domain to access need to know data

Implicit deny

Hierarchical- label
Comportmatlized - Security domain
Hybrid - combination of both

33
Q

Rule based access control

A

Uses global rules applied to all users and other subjects equally

34
Q

Role based access control

A

Based on role or Group memberships

Users can be part of members of multiple groups

35
Q

Radius

A

AAA protocol services
Users udp and encrypts password only

36
Q

TACACS+

A

Uses TCP and encrypts entire session

Admin access to network devices

37
Q

Pass the hash

A

NTLM legacy protocol

38
Q

Pass the ticket

A

Kerberos

39
Q

Accountability

A

I+A+A

40
Q

Smartcards

A

Microprocessor+ cryptography certificates

41
Q

Gait analysis

A

Way one walks

42
Q

3 types of Security controls

A

Assets
1. Administrative - policies
2. Logical/ Technical - Protect against attacks and exploits
3. Physical

43
Q

Tempest

A

Electronic emanations that every monitor produces to be read from a distance (effective on CRT monitors)

Shoulder surfing for monitor displays

44
Q

How do we reduce physical asset theft?

A

RFID , barcode and inventory

45
Q

Reference monitor

A

Access control is all about subject access to objects through meditation known as rules.

It’s called reference monitor

Implementation of RM is through security kernel

46
Q

Who does authentication and authorisation in SSO ?

A

Authentication is done by authentication server and authorisation by application using ticket