Deck Flashcards

1
Q

What is counter mode (CTM) for symmetric algorithms or block ciphers?

A
  • Uses counter to make nonce for each block encryption.
  • very fast
  • make nonce, encrypt nonce, XOR nonce w/ plaintext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CCMP for symmetric algorithms or block ciphers?

A
  • involves cipher block chaining(CBC) w/ MAC
  • designed for block cipher of 128-bit
  • length of message needs to be known first
  • Data encapsulation for wireless
  • AES cipher uses CCMP for integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Galois Counter Mode(GCM) for symmetric algorithms or block ciphers?

A
  • Extention of CTM but adds authentication
  • Fast as well.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Simultaneous Authentication of Equals (SAE)?

A
  • Password key exchange for mesh networks
  • Uses dragonfly protocol for key exchange
  • resists active, passive, and dictionary attacks
  • Used in WPA3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Extensible Authentication Protocol(EAP)?

A
  • For wireless with better authentication with PPP
  • Supports tokens, smart cards, certs, one-time passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Protected Extensible Authentication Protocol(PEAP)?

A
  • Protects EAP by encapsulation in TLS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Extensible Authentication Protocol-FAST(EAP-FAST)?

A
  • Cisco replacement for LEAP
  • lightweight tunneling for authentication
  • Need Protected Access Credential(PAC) to establish tunnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Extensible Authentication Protocol-TLS(EAP-TLS)?

A
  • Most secure of EAP
  • Need client-side cert
  • Attacker needs client key to break TLS channel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Extensible Authentication Protocol-TTLS(EAP-TTLS)?

A
  • EAP-TLS with an extra tunnel
  • protected from MITM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are site surveys?

A
  • Mapping floor plan, RF interference, RF coverage dictate AP placement
  • site predeployment and site again post deployment to compare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Heat Maps?

A
  • For wireless coverage and strength
  • made with Wifi analyzer
  • to find weak spots
  • a heatmap is a subset of a site survey
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a wifi analyzer?

A
  • determines signal strength and interference
  • used to make heat maps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of WAP placement?

A
  • many components to consider for placement
  • don’t want people outside of building to be able to access
  • use site surveys to help figure out placement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is containerization and storage segmentation on mobile devices?

A
  • divide device into multiple containers – one for work, one for personal
  • keeps corporate data separate from personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SEAndroid?

A
  • Mobile Security Enhanced Linux(SELinux)
  • Enforces Mandatory Access Control
  • Implicit deny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is sideloading?

A
  • third-party addition of apps on device.
  • installing malware is higher with this method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is data minimization?

A
  • Limit collection of data to only relevant and necessary
  • reduces breaches
  • data only stays for a period of time then it is deleted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a certificate authority(CA)?

A
  • Certifies identities and issues digital certs
  • digital cert links user to public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an intermediate certificate authority?

A
  • Transfers trust between different CAs
  • aka subordinate CAs
  • intermediate CAs use higher-level CAs as reference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a registration authority(RA)?

A
  • Accepts request for a digital cert
  • performs necessary steps of registering and authentication of user wanting digital cert
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is online certificate status protocol (OCSP)?

A
  • Used for cert revocation
    Reviews CRL to see if cert is valid
  • backup if CRL is slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Certificate Signing Request (CSR)?

A
  • gives the public key and user info needed for digital cert to CA for decision
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a code signing certificate?

A
  • forces cert and app that uses cert to adhere to proper cert usage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are self-signed certificates?

A
  • The highest level of cert
  • aka root certificate
  • highest trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Offline vs. Online CA

A
  • certs that are very specific and important are offline certs – this provide security
  • digital certs that need to be signed a lot are online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is stapling?

A
  • combinig related items to reduce communication steps
  • more efficient, minimizes burden
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is ceritificate pinning?

A
  • pins a host to an X.509 certificate
  • good for unsecure networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is certificate chaining?

A
  • root cert trusts lower level certs creating a chain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IR Response Order:

A

Prep, identification,containment,eradication,recovery, lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IR Process: Preparation

A
  • Takes place before an incident occurs
  • helps to be organized when a specific incident does occur
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IR Process: Identification

A
  • gather and process info and see if incident is bad enough
  • determine cause of incident
  • see if it needs full IR process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IR Process: Containment

A
  • prevent spread to mitigate damage
  • helps keep production running if possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IR Process: Eradication

A
  • get rid of malware; wipe system clean, revert, scrap the machine, etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IR Process: Recovery

A
  • Return the asset to business operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IR Process: Lessons Learned

A
  • Used to correct weaknesses and ways to improve
  • document what went wrong
  • examine IR processes to see if it was effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is ARP Poisoning?

A
  • attacker poisons ARP table
  • Packets will then get misdirected
  • causes MITM attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a federation?

A
  • policies, protocols to manage identities across systems and organization
  • can use SAML
  • access resources across multiple enterprises; whereas SSO is multiple resources across single enterprise.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Narrow-band radio?

A
  • low power and long range
  • small amount of data transfered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is baseband radio?

A
  • a single signal that makes a single channel of communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Perfect forward Secrecy(PFS)?

A
  • makes a temporary, unique private key for every session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Homomorphic Encryption?

A
  • algorithm for operations on encrypted data without decrypting and re-encrypting
  • very speedy and good for transaction-based systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a next-generation firewall(NGFW)?

A
  • inspect actual traffic crossing firewall like its content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a disassociation attack?

A
  • disconnect a host on a wireless network
  • attacker needs MAC to de-auth victim
  • intended to gain credentials during reconnect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is an API attack?

A
  • attackers gain access to databases through weak API security
  • data breaches can occur
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Forward proxy

A
  • acts on behalf of user
  • can bypass firewall settings
  • act as a cache server
  • obfuscate user IP
46
Q

Reverse Proxy

A
  • Installed server side and acts on behalf of server
  • intercepts web requests
  • can trafic filter, SSL/TLS decryption, and load balance
47
Q

What is WPA2-Personal or PSK?

A
  • Supports CCMP
  • typical in personal home
  • requires single key on AP and client for authentication.
48
Q

What is WPA2-Enterprise?

A
  • Uses IEEE 802.1X
  • uses stronger keys
  • uses authentication server
49
Q

What is RFID?

A
  • up to 200 meters
  • Active or passive
  • attacks include: replay and eavedropping
50
Q

What is Near Field Communication(NFC)?

A
  • Subset of RFID
  • 10 cm or less
  • smartcards
51
Q

What is context-aware authentication?

A
  • relies on contextual info
  • who user is, what resources they are requesting, how they are connected
  • EX: person being denied because they aren’t in the office
52
Q

What is a P7B file format?

A
  • base64 ASCII format
  • file extension .p7b or .p7c
  • file begins with “——BEGIN PKCS7—–”
  • contains certificates and chain certificates
  • Used on Java Tomcat, Microsoft Windows
53
Q

What is a Cloud Access Security Broker(CASB)?

A
  • sits between consumer and cloud provider
  • enforce enterprise policies
  • provides visibility into app use, data use, verification of compliance, monitoring of identification of threats
54
Q

What is Recovery Time Objective(RTO)?

A
  • target time set for operations to resume after an incident
  • defined by the business based on needs
  • shorter time = more money
55
Q

What is Recovery Point Objective(RPO)?

A
  • time period representing the max amount of acceptable data loss
  • defines frequency of backups to prevent data loss
56
Q

What is a directory traversal attack?

A
  • adding “../..” in input box to gain access to filesystem in a database
  • relies on bad input validation
57
Q

What is a Memorandum of Understanding(MOU)?

A
  • bilateral agreement between parties
  • informal letter; not a contract
58
Q

What is Data Execution Prevention(DEP)?

A
  • Prevents users from executing code on a system
59
Q

What is Infrastructure as a Service(IaaS)?

A
  • Outsource Hardware
  • No OS, or apps
  • you manage security
  • you have more control of data
60
Q

What is Platform as a Service(PaaS)?

A
  • Cloud provider gives hardware, OS, and runtime
  • Cloud provider controls platform
  • You develop applications on this model
61
Q

What is Security Assertion Markup Language(SAML)?

A
  • SSO used for web apps to share user identities
  • popular with cloud providers and SaaS
  • XML-Based protocol
  • passes tokens and assertions about user to SAML authority
  • Can log into many different websites with SAML
62
Q

What is a HTML5?

A
  • implement secure HTML5 for a VPN
  • no plugins required so update management is easier than standard VPN
  • alternative to a SSL/TLS VPN
63
Q

What is a cer/crt file format?

A
  • can be encoded binary DER or ASCII PEM
  • CER used for Microsoft
  • CRT used for Unix
64
Q

What is a Distinguished encoding roles (DER)?

A
  • encode data object into binary
  • Used for a single certificate
  • often JAVA certificates use DER
65
Q

What is a pointer/object dereference?

A
  • If a pointer points to nothing, then this can cause an application crash, debug info displayed, DoS
66
Q

What is an Extensible Markup Language(XML) injection?

A
  • Can be used to create new users and possibly get admin access
  • Need good input validation
67
Q

What is a collision attack?

A
  • where two different inputs create same hash function.
  • Birthday attack can cause a collision with weak hash functions
68
Q

What is prepending?

A
  • adding something else to the beginning of an item
  • can be used for social engineering to add legitimacy
69
Q

What is pretexting?

A
  • uses a narrative(pretext) to influence victim into helping them out.
70
Q

What is pharming?

A
  • misdirect users to fake websites that look legit
  • misdirects through modification of host files or DNS poisoning
71
Q

What is Privacy-enhanced Mail(PEM)?

A
  • most common cert format
  • Base64-encoded ASCII
  • format: “—-BEGIN CERTIFICATE—-“ and “—– END CERTIFICATE—–”
  • can contain public and private keys
  • can carry multiple certificates in on file
  • common file formats: .pem, .cer, .crt, .key
72
Q

What is Personal Information Exchange(PFX)?

A
  • binary format to store server certificate, intermediate certificates, and a private key
  • used on Windows machines to import and export certs and private keys
73
Q

What is operational control?

A
  • policy or procedure to limit security risk
  • executed by people themselves primarily
  • maintenance, media protection, incident response, awareness and training, personnel security
74
Q

How can you mitigate a malicious USB on a Windows machine?

A
  • User awareness training
  • Disable autoplay on removable media
75
Q

What is DNSSEC?

A
  • Secure DNS
  • Uses TCP port 53 for larger transfers
  • adds integrity and authentication with digital signing
76
Q

What is Secure Shell(SSH)?

A
  • Secure remote terminal connection
  • uses asymmetric encryption
  • uses public key cryptography
77
Q

What is Secure/Mulipurpose Internet Mail Extensions(S/MIME)?

A
  • base64 encoding for email messages
  • public key encryption and digital signing of MIME data in emails
  • provides authentication, message integrity, and nonrepudiation
78
Q

What is Secure Real-time Transport Protocol(SRTP)?

A
  • secure audio and video over IP networks
  • provides encryption, message authentication, and integrity, and replay protection
79
Q

What is LDAPS?

A
  • uses TCP port 636 for communication
  • uses TCP port 3269 for comms to global catalog server
  • LDAP over SSL
  • uses certificate from trusted CA
  • replaced by LDAPv3 and SASL
80
Q

What is File Transfer Protocol, Secure (FTPS)?

A
  • FTP over SSL/TLS for encryption
  • uses TCP 989 for data connection
  • uses TCP 990 for control connection
81
Q

What is SSH File Transfer Protocol(SFTP)?

A
  • FTP over SSH
  • leverages SSH for encryption
  • Uses TCP port 22
82
Q

What is SNMPv3?

A
  • manages devices on IP networks
  • the only secure version of SNMP
83
Q

What is HTTPS?

A
  • HTTP over SSL/TLS
  • TCP port 443
  • offers integrity and confidentiality
84
Q

What is IPSec?

A
  • securely exchange packets at layer 3 of OSI
  • uses AH to protect header
  • uses ESP to protect body of data
  • Two modes: transport(only protects data) and tunnel(protects the whole packet)
85
Q

What is Secure POP3?

A
  • Uses TCP port 995
  • POP3 over TLS
86
Q

What is IMAP4?

A
  • uses TCP port 993
  • IMAP over TLS
87
Q

What is NTPSec?

A
  • Uses TLS
  • port 123
88
Q

What is USB OTG?

A
  • Helps directly connects between USB OTG devices
  • they change between host and device
89
Q

What is a Next-Generation Secure Web Gateway(SWG)?

A
  • between users and internet
  • check web requests against company policy
  • includses URL filtering, app control, dlp, antivirus, and HTTPS inspection
  • similar to a NGFW
90
Q

What are SSH keys?

A
  • credentials used by SSH
  • used primarily for automated processes and services
  • uses public key cryptography
91
Q

What is Challenge-Handshake Authentication Protocol(CHAP)?

A
  • provide authentication through three-way handshake
  • uses PPP which does three things: encapsulates datagrams, establish, configure, and test links with link control protocol(LCP), establish and configure different network protocols using network control protocol(NCP)
92
Q

What is password authentication protocol(PAP)?

A
  • authentication protocol
  • two-way handshake where credentials are sent in clear-text
  • no protection against playback and line sniffing
  • deprecated
93
Q

What is attribute-based access control (ABAC)?

A
  • based on user attributes, resource or object attributes, environmental attributes
  • more costly and complicated than other access control models
94
Q

What is Role-based Access Control?

A
  • user granted permissions based on role in corporation
95
Q

What is Rule-based Access Control?

A
  • access determination based on ACLs
  • only admin can modify rules
  • example can be no access to resources outside of work hours
96
Q

What is stakeholder management?

A
  • includes defined personnel roles and responsibilites for stakeholder relationships during an incident
  • functions include legal, communications, liaisons, customer support, and operations personnel
97
Q

What is a business continuity plan?

A
  • defines policies and planning that ensures business continuity during a time of turmoil
  • only cares about the essential functions to operate
98
Q

What is continuity of operation planning(COOP)?

A
  • determines which operations need to continue during periods of disruption.
  • Identifying critical assets, critical systems and keeping high availability.
99
Q

What is Nxlog?

A
  • tool suite to help with syslog and Windows
  • can do log correlation, context-based lookups, and rule-based enrichments
  • can also act as log collector, forwarder, aggregator, and investigative tool.
100
Q

What is journalctl?

A
  • command to view systemd logs
  • examine logs on a server
101
Q

What is Rsyslog?

A
  • open source variant of syslog
  • has content filtering, log enrichment, and correlation of data elements
102
Q

What is syslog-ng?

A
  • open source variant of syslog
  • has content filtering, log enrichment, and correlation of data elements but in REAL-TIME
103
Q

What is Netflow?

A
  • made from Cisco
  • collect packets from routers and switches
  • Useful in intrusion investigations
104
Q

What is sFlow?

A
  • Collects packets from routers and switches
  • Used more for traffic management, and can help with DDos attacks.
105
Q

IPFIX

A
  • IETF’s version of netflow
  • provide central monitoring station with info about state of network
  • push-based protocol;sender pushes reports, but gets no response
106
Q

SOAR Runbook

A
  • accelerate incident response process by automating steps
  • more technical and focuses on systems and services
107
Q

SOAR Playbook

A
  • approved steps to respond to a specific incident or threat
  • focuses more on people and general business
108
Q

Order of Volatility

A
  1. CPU, cache, and registers
  2. routing tables, ARP cache, process tables, Kernel stats
  3. live network connections and data flows
  4. RAM
  5. temp files/swap space
  6. Data on hard disk
  7. remotely logged data
  8. backups
109
Q

swap/pagefile

A
  • provides temp storage for memory that exceeds RAM capacity
  • pagefile.sys
  • extension of RAM
110
Q

E-Discovery

A
  • document used for legal discovery in civil litigation
  • electronic info is that same as paper docs
111
Q

Managerial Control

A
  • based on overall risk management
  • risk assessment, planning, system and services acquisition, certification, accreditation, and security assessments
112
Q

Corrective Control

A
  • Used after an event to minimize extent of damage
  • load balancers, redundant systems, backups