CSCI 427 Exam 1 Flashcards

1
Q

What are the three principles that form the Security Triad?

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality mean in the context of security?

A

data is only available to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does integrity mean in the context of security?

A

the data has not been altered between the person who originated it and the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does availability mean in the context of security?

A

data and systems being available when needed without interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between authentication and authorization?

A

authentication: procedures to identify users are who they claim to be (the account itself)
authorization: permissions to control user access to data (permissions assigned to that particular account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

? is the ability of a system to track the actions of users.

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When implemented correctly, ? provides nonrepudiation

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pentesters should always have ? before starting a pentest

A

permission/contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three questions pentesters should always ask clients prior to performing a penetration test

A

(1) Why do they want/need a pentest? (2) What are the rules of engagement? (3) What are the client’s expectations at the end of the test?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who was John Nevil Maskelyne, and why is he noteworthy in the context of hacking?

A

credited for the first known form of electronic “hacking” – disrupting a wireless telegraph (hacked the radio signal to prove insecure by turning the dial to the right frequency and overpowering the signal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Section 1030 of the Computer Fraud and Abuse Act defines a “protected computer” as any computer taking part in interstate and/or foreign commerce and/or communication. Why is this definition considered broad and applicable to almost any computer?

A

It sweeps up every modern computer because all are used for email, online shopping, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Layer 2 (Ethernet) device that is outmoded and should never be used?

A

hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a switch differ from a hub?

A

only send signals to their intended recipients (hubs forward signals to all connected devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Layer 3 (Network) device that connects networks?

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

? is a critical network device that restricts traffic between networks and typically sits between a router and the Internet

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

? are placed close to network choke points and monitor for malicious network traffic

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the 7 layers of the OSI Model

A

(in order 7 to 1): Application, Presentation, Session, Transport, Network, Data Link, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP takes place at which OSI layer?

A

transport (L4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethernet takes place at which OSI layer?

A

data link (L2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List the steps of the TCP three-way handshake

A
  1. client sends a SYN data packet to a server to see if the server is open for new connections
  2. the server responds and returns a SYN/ACK packet to confirm
  3. the client receives the SYN/ACK from the server and responds with an ACK packet
  4. the connection is created and the client and server can now communicate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which header includes IP addresses?

A

IP header format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which header can include SYN flags?

A

TCP segment header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which header includes MAC addresses?

A

Ethernet segment header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List 3 common network device vulnerabilities.

A

enabled telnet, default passwords, out of date firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SYN flag
initiates a connection between two hosts
26
ACK flag
acknowledges the receipt of a SYN and data packets after a connection is established
27
FIN flag
tells the remote system that no more data will be sent, gracefully closing a connection
28
Encryption primarily accomplishes ? in the Security Triad.
confidentiality
29
Digital signatures provide nonrepudiation because
only the public key can decrypt anything that’s been encrypted with the private key; cryptography allows authentication to positively identify data as coming from its creator
30
Nonrepudiation is
positive, undeniable evidence of a source
31
A cipher is
the algorithm used for encrypting plain text into cipher text (encryption algorithm)
32
What is the difference between symmetric and asymmetric cryptography?
symmetric uses a single key to both encrypt and decrypt asymmetric uses a key pair system – a public (internet) key and a private (you/server only) key
33
Which of the following symmetric algorithms is still considered secure? RC4, DES, AES- 256
AES-256
34
What are the two drawbacks (weaknesses) to using symmetric cryptography?
1. no nonrepudiation features because you only have one key | 2. key management (how do both parties get the same key securely?)
35
What are the six steps of the TLS handshake?
1. Client sends “hello” to the server, which includes the encryption algorithms the client supports 2. Server responds with “hello” that includes the encryption algorithm the server will accept and also includes the server’s certification which contains he public key 3. Client uses agreed upon encryption algorithm to generate a session key, which is then encrypted with the public key 4. Client sends the encrypted session key and a “client finished” message to the server 5. Server uses private key to decrypt the session key and responds with a “server finished” message 6. Secure symmetrically encrypted transmissions now take place using the session key
36
What do certificate authorities do?
create & bind together private and public keys and issue them to clients
37
Define hashing
a one-way encryption algorithm that in theory cannot be reversed
38
The five steps of the RSA algorithm
1. Generate two large primes, p and q, such that their product is the required bit length. 2. n = p*q 3. phi(n) = (p-1)(q-1) 4. Select e such that 1 < e < phi(n) AND the GCD of e and phi(n) = 1 5. Compute d, where 1 < d < phi(n), such that d*e(mod phi(n)) = 1
39
What two values constitute the RSA public key?
(e, n)
40
What two values constitute the RSA private key?
(d, n)
41
RSA encryption algorithm
t^e (mod n) = c
42
RSA decryption algorithm
c^d (mod n) = t
43
Why have the majority of mobile devices moved to elliptic curve cryptography?
less cpu cycles are required compared to RSA (computationally efficient)
44
In ECC, what is P?
random generator point (starts encryption process)
45
In ECC, what is T?
public key; some other point on the curve derived after a number of group operations
46
In ECC, what is d?
private key; number of group operations to arrive at T
47
What is the difference between a port scan and a vulnerability scan?
open ports vs vulnerable services running on those ports
48
What is the phase of penetration testing where you build a picture of the target’s security posture?
footprinting
49
What is the phase of penetration testing where information gathered during footprinting is built upon by finding open ports, locating more hosts, and revealing host vulnerabilities?
scanning
50
? is a full-featured data mining tool included in Kali.
Maltego
51
whois
finds domain name and name server ownership
52
nslookup
queries DNS servers for IP addresses
53
traceroute
how many routers b/w you and target
54
perform an aggressive scan
nmap -A
55
perform a ping scan only
nmap -sP
56
operating system detection
nmap -O
57
service version detection
nmap -sV
58
Know the hping3 command to perform a DoS attack while obfuscating your IP.
hping3 -S –flood –rand-source [ip of target]
59
A ? connection creates a listening socket on the target and requires the attacker to use an open port on the organization’s firewall.
forward bind
60
List 3 of the most common system vulnerabilities.
memory, input validation, privilege escalation
61
What is RHOST?
target IP
62
What is LHOST?
attacker IP
63
What is an exploit?
code that takes advantage of a vulnerability
64
What is a payload?
code delivered via exploit that creates a connection to attacker
65
What is the command to start the database Metasploit uses?
service postgresql start
66
What is the command to initialize the database Metasploit uses?
msfdb init
67
Why is it forensically difficult to determine if a computer has been compromised by Metasploit?
runs in RAM
68
What is the command to search for exploits in Metasploit?
search
69
How do you know if a payload creates a forward or reverse connection?
forward has bind in title, reverse is in the /reverse directory
70
What is the command to view options for exploits and payloads?
show options
71
What is the command to set options?
set
72
What is the command to use an exploit?
use
73
What is the command to run an exploit?
exploit or run
74
IP goes with Layer
3 (network)
75
MAC goes with Layer
2 (data link)
76
Know the option and syntax to perform an nmap scan against a given target and range of ports.
nmap -p50-100 [target]
77
What is Armitage?
gui interface for metasploit
78
A ? connection creates a listener on the attacker’s computer and requires waiting for the target to connect to the attacker, thus bypassing inbound firewall rules at the organization
reverse