Deck 1 Flashcards

1
Q

What is DAC?

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is kismet?

A

Kismet is an open source wireless sniffer. It can monitor wireless networks and the devices connected to them. As well as create coverage maps based on signal strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where should a WAF be placed?

A

A Web Application Firewall (WAF) helps protect web applications from common attacks. It needs to sit in front of the web servers to perform its job and should be placed behind the firewall, as it does not replace the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is AES?

A

Advanced Encryption Standard (AES), another symmetric algorithm, is the replacement for DES. It can provide three different block sizes: 128, 192, and 256. Each goes through more iterations of computing the algorithm applied to the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DES?

A

Digital Encryption Standard (DES), a symmetric algorithm, uses a 64-bit key and divides the message into 64-bit blocks, with 16 rounds of transposition and substitution performed on each block. Replaced by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IDEA?

A

International Data Encryption Algorithm (IDEA) is a symmetric block cipher that uses 64-bit blocks. Each block is divided into 16 smaller blocks and then computed several times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AEAD?

A

Authentication Encryption with Associated Data (AEAD) encrypts data with a symmetric key and generates an authentication tag that can verify the data’s authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a state-based threshold?

A

State-based thresholds are triggered when a system state changes, such as a firewall beginning a graceful shutdown or starting up after rebooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a fixed threshold?

A

Fixed thresholds are based on fixed numeric values or calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a historical threshold?

A

Historical thresholds consider past and present values and are often used to compare different periods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the perimeter network?

A

Perimeter network is the boundary between an internal network and the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Integer overflow?

A

An integer overflow occurs if an application tries to store a number that is larger than the size allocated to it. This can cause the number to wrap around or cause unusual behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Javasnoop

A

JavaSnoop is for testing the security of Java applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is diStorm3?

A

The diStorm3 tool is for reverse engineering software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Haschat?

A

Haschat is a password cracking tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a VLAN?

A

Virtual local area networks (VLANs) are logical subdivisions of a switch that segregate ports from one another as if they were in different LANs. VLANs can also span multiple switches, meaning that devices connected to the switches in different parts of a network can be placed in the same VLAN, regardless of physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Port Mirroring?

A

Port mirroring is the process of replicating data transmitted over one switch port on another port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a collision domain?

A

Collision domains are segments of a network where packets may collide (e.g., an entire network hub or an individual switch port).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a broadcast domain?

A

Broadcast domains are a segment of a network that all receive the same broadcast messages.

20
Q

What is a hashing collision?

A

When a hashing algorithm produces the same output from two different inputs

Hashing algorithms are often used for data integrity and authentication. It is important for them to produce different outputs (hash values) given a different input. When two different inputs create the same hash value, cybersecurity professionals call that a collision

21
Q

What are the 4 ways to handle risk?

A

The four ways to handle risk are:
• Avoid - Eliminate the risk in some way. For example, an organization may avoid doing something or stop doing something.
• Accept - Accept the risk and proceed anyway. An informed decision has been made to move forward despite the risk.
• Transfer - Transfer the risk to some other organization or person. A common example of transferring risk is purchasing insurance.
• Mitigate - A control(s) is implemented to reduce risk.

22
Q

What is OWASP?

A

The Open Web Application Security Project (OWASP) is a group that monitors attacks, specifically web attacks. They seek to provide additional information to those affected by any cyber attacks and maintain a list of the top 10 attacks impacting web applications (the “OWASP Top 10).

23
Q

What is SCAP?

A

The Security Content Automation Protocol (SCAP) is maintained by the National Institute of Standards (NIST) and includes specifications that help standardize cybersecurity automation tasks including vulnerability and compliance management.

24
Q

What is IEC?

A

The International Electrotechnical Commission (IEC) maintains electronic and electrical engineering standards

25
Q

What is ISO?

A

The International Organization for Standardization (ISO) maintains a variety of engineering standards, but not electronic and electrical engineering standards (which are maintained by the IEC).

26
Q

What is a CDN?

A

A CDN (content delivery network) is a network of servers that provides content like images, videos, and web pages to help improve website speed and availability

27
Q

What is SOAR?

A

SOAR (security orchestration, automation, and response) tools help centralize security management and automate responses.

28
Q

What is bootstrapping?

A

In data science and cybersecurity, bootstrapping refers to the process of extrapolating a conclusion based on a data set. Bootstrapping can be useful in helping machine learning algorithms used in tools like SOAR tools to better detect threats and patterns.

29
Q

What is ISACs?

A

Information Sharing and Analysis Centers (ISACs) is specifically mentioned in the exam objectives, and it refers to a website that grows “a diverse community of companies that leverage information technology and have in common a commitment to cyber-security.” Its website is at www.it-isac.org.

30
Q

What is OVAL?

A

The Open Vulnerability and Assessment Language (OVAL) is used for sharing information about vulnerabilities

31
Q

What is NIST?

A

The National Institute of Technology (NIST) focuses on measurements, standards, and research.

32
Q

What is packet capturing?

A

Packet capturing is used to capture packets of data on a network for analysis. If the packets are not encrypted, an attacker can learn a lot of sensitive information

33
Q

What is keylogging?

A

Keylogging is used to capture sensitive information that a user types on their keyboard.

34
Q

Does a vulnerability scan capture packets?

35
Q

Rank from most volatile to least

A
  1. Cache and registers
    1. Routing tables, kernel statistics, memory, etc.
    2. Temporary file systems/swap space
    3. Data on hard disk
    4. Remote logging data and monitoring data
    5. Physical configurations and network topology
    6. Archival media
36
Q

What is OCSP?

A

The Online Certificate Satus Protocol (OCSP) is used to check the revocation status of a digital certificate.

37
Q

What is SNMP?

A

The Simple Network Monitoring Protocol (SNMP) is used to monitor and manage network devices.

38
Q

What is EAP?

A

Extensible Authentication Protocol (EAP) is a framework for authentication in networks

39
Q

What is SCAP?

A

The Security Content Automation Protocol (SCAP) is used to automate security tasks.

40
Q

What is ESP?

A

Encapsulating security payload (ESP) provides data confidentiality

41
Q

What is AH?

A

Authentication Header (AH) provides data integrity and authentication.

42
Q

What is ISAKMP?

A

Internet Security Association and Key Management Protocol (ISAKMP) handles the creation of the security association for the session and exchange keys

43
Q

What is IKE?

A

Internet Key Exchange (IKE) is also sometimes referred to as IPsec Key Exchange. It provides the authentication material used to create the keys exchanged by ISAKMP during peer authentication.

44
Q

What is IPsec?

A

IPSec is a set of communication rules or protocols for setting up secure connections over a network. Internet Protocol (IP) is the common standard that determines how data travels over the internet. IPSec adds encryption and authentication to make the protocol more secure. For example, it scrambles the data at its source and unscrambles it at its destination. It also authenticates the source of the data.

45
Q

Explain directory services

A

Directory services are used to provide organizational information such as users, servers, printers, other resources on a network. LDAP is an example of a directory service protocol.

46
Q

What is a federation?

A

A federation is a group of domains with an established trust

47
Q

What is peering?

A

Peering is a technique for directly connecting two networks.