CSCI 427 Exam 1 Flashcards

1
Q

What are the three principles that form the Security Triad?

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality mean in the context of security?

A

data is only available to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does integrity mean in the context of security?

A

the data has not been altered between the person who originated it and the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does availability mean in the context of security?

A

data and systems being available when needed without interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between authentication and authorization?

A

authentication: procedures to identify users are who they claim to be (the account itself)
authorization: permissions to control user access to data (permissions assigned to that particular account)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

? is the ability of a system to track the actions of users.

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When implemented correctly, ? provides nonrepudiation

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pentesters should always have ? before starting a pentest

A

permission/contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three questions pentesters should always ask clients prior to performing a penetration test

A

(1) Why do they want/need a pentest? (2) What are the rules of engagement? (3) What are the client’s expectations at the end of the test?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who was John Nevil Maskelyne, and why is he noteworthy in the context of hacking?

A

credited for the first known form of electronic “hacking” – disrupting a wireless telegraph (hacked the radio signal to prove insecure by turning the dial to the right frequency and overpowering the signal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Section 1030 of the Computer Fraud and Abuse Act defines a “protected computer” as any computer taking part in interstate and/or foreign commerce and/or communication. Why is this definition considered broad and applicable to almost any computer?

A

It sweeps up every modern computer because all are used for email, online shopping, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Layer 2 (Ethernet) device that is outmoded and should never be used?

A

hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a switch differ from a hub?

A

only send signals to their intended recipients (hubs forward signals to all connected devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Layer 3 (Network) device that connects networks?

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

? is a critical network device that restricts traffic between networks and typically sits between a router and the Internet

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

? are placed close to network choke points and monitor for malicious network traffic

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the 7 layers of the OSI Model

A

(in order 7 to 1): Application, Presentation, Session, Transport, Network, Data Link, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP takes place at which OSI layer?

A

transport (L4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethernet takes place at which OSI layer?

A

data link (L2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List the steps of the TCP three-way handshake

A
  1. client sends a SYN data packet to a server to see if the server is open for new connections
  2. the server responds and returns a SYN/ACK packet to confirm
  3. the client receives the SYN/ACK from the server and responds with an ACK packet
  4. the connection is created and the client and server can now communicate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which header includes IP addresses?

A

IP header format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which header can include SYN flags?

A

TCP segment header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which header includes MAC addresses?

A

Ethernet segment header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List 3 common network device vulnerabilities.

A

enabled telnet, default passwords, out of date firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SYN flag

A

initiates a connection between two hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

ACK flag

A

acknowledges the receipt of a SYN and data packets after a connection is established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

FIN flag

A

tells the remote system that no more data will be sent, gracefully closing a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Encryption primarily accomplishes ? in the Security Triad.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Digital signatures provide nonrepudiation because

A

only the public key can decrypt anything that’s been encrypted with the private key; cryptography allows authentication to positively identify data as coming from its creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Nonrepudiation is

A

positive, undeniable evidence of a source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A cipher is

A

the algorithm used for encrypting plain text into cipher text (encryption algorithm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the difference between symmetric and asymmetric cryptography?

A

symmetric uses a single key to both encrypt and decrypt

asymmetric uses a key pair system – a public (internet) key and a private (you/server only) key

33
Q

Which of the following symmetric algorithms is still considered secure? RC4, DES, AES- 256

A

AES-256

34
Q

What are the two drawbacks (weaknesses) to using symmetric cryptography?

A
  1. no nonrepudiation features because you only have one key

2. key management (how do both parties get the same key securely?)

35
Q

What are the six steps of the TLS handshake?

A
  1. Client sends “hello” to the server, which includes the encryption algorithms the client supports
  2. Server responds with “hello” that includes the encryption algorithm the server will accept and also includes the server’s certification which contains he public key
  3. Client uses agreed upon encryption algorithm to generate a session key, which is then encrypted with the public key
  4. Client sends the encrypted session key and a “client finished” message to the server
  5. Server uses private key to decrypt the session key and responds with a “server finished” message
  6. Secure symmetrically encrypted transmissions now take place using the session key
36
Q

What do certificate authorities do?

A

create & bind together private and public keys and issue them to clients

37
Q

Define hashing

A

a one-way encryption algorithm that in theory cannot be reversed

38
Q

The five steps of the RSA algorithm

A
  1. Generate two large primes, p and q, such that their product is the required bit length.
  2. n = p*q
  3. phi(n) = (p-1)(q-1)
  4. Select e such that 1 < e < phi(n) AND the GCD of e and phi(n) = 1
  5. Compute d, where 1 < d < phi(n), such that d*e(mod phi(n)) = 1
39
Q

What two values constitute the RSA public key?

A

(e, n)

40
Q

What two values constitute the RSA private key?

A

(d, n)

41
Q

RSA encryption algorithm

A

t^e (mod n) = c

42
Q

RSA decryption algorithm

A

c^d (mod n) = t

43
Q

Why have the majority of mobile devices moved to elliptic curve cryptography?

A

less cpu cycles are required compared to RSA (computationally efficient)

44
Q

In ECC, what is P?

A

random generator point (starts encryption process)

45
Q

In ECC, what is T?

A

public key; some other point on the curve derived after a number of group operations

46
Q

In ECC, what is d?

A

private key; number of group operations to arrive at T

47
Q

What is the difference between a port scan and a vulnerability scan?

A

open ports vs vulnerable services running on those ports

48
Q

What is the phase of penetration testing where you build a picture of the target’s security posture?

A

footprinting

49
Q

What is the phase of penetration testing where information gathered during footprinting is built upon by finding open ports, locating more hosts, and revealing host vulnerabilities?

A

scanning

50
Q

? is a full-featured data mining tool included in Kali.

A

Maltego

51
Q

whois

A

finds domain name and name server ownership

52
Q

nslookup

A

queries DNS servers for IP addresses

53
Q

traceroute

A

how many routers b/w you and target

54
Q

perform an aggressive scan

A

nmap -A

55
Q

perform a ping scan only

A

nmap -sP

56
Q

operating system detection

A

nmap -O

57
Q

service version detection

A

nmap -sV

58
Q

Know the hping3 command to perform a DoS attack while obfuscating your IP.

A

hping3 -S –flood –rand-source [ip of target]

59
Q

A ? connection creates a listening socket on the target and requires the attacker to use an open port on the organization’s firewall.

A

forward bind

60
Q

List 3 of the most common system vulnerabilities.

A

memory, input validation, privilege escalation

61
Q

What is RHOST?

A

target IP

62
Q

What is LHOST?

A

attacker IP

63
Q

What is an exploit?

A

code that takes advantage of a vulnerability

64
Q

What is a payload?

A

code delivered via exploit that creates a connection to attacker

65
Q

What is the command to start the database Metasploit uses?

A

service postgresql start

66
Q

What is the command to initialize the database Metasploit uses?

A

msfdb init

67
Q

Why is it forensically difficult to determine if a computer has been compromised by Metasploit?

A

runs in RAM

68
Q

What is the command to search for exploits in Metasploit?

A

search

69
Q

How do you know if a payload creates a forward or reverse connection?

A

forward has bind in title, reverse is in the /reverse directory

70
Q

What is the command to view options for exploits and payloads?

A

show options

71
Q

What is the command to set options?

A

set

72
Q

What is the command to use an exploit?

A

use

73
Q

What is the command to run an exploit?

A

exploit or run

74
Q

IP goes with Layer

A

3 (network)

75
Q

MAC goes with Layer

A

2 (data link)

76
Q

Know the option and syntax to perform an nmap scan against a given target and range of ports.

A

nmap -p50-100 [target]

77
Q

What is Armitage?

A

gui interface for metasploit

78
Q

A ? connection creates a listener on the attacker’s computer and requires waiting for the target to connect to the attacker, thus bypassing inbound firewall rules at the organization

A

reverse