Domain 3 - Security Architecture and Engineering Flashcards

1
Q

Define Brewer-Nash model

A

The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the “ m of n “ control?

Harry would like to retrieve a lost encryption key from a database that uses m of n control, with m = 4 and n = 8. What is the minimum number of escrow agents required to retrieve the key?

A

In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital signatures that are approved part of the federal Digital Signature Standard under FIPS 186-4

A

RSA
ECDSA
DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Another term for sandbox

A

Confinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.

A Trust
B Credentialing
C Verification
D Assurance

A

D.
Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Maintenance Hook

A

Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Biba model (two) attributes

A

a. Simple Integrity Property NO READ DOWN
b. *(star) Integrity Property NO WRITE UP

INTEGRITY ONLY!!NO READ DOWN, NO WRITE UP**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Bell-LaPadula model attributes

A

a. Simple Security Property. NO READ UP! Example: Secret cannot read up to TOP Secret
b. *(star) Security Property. NO WRITE DOWN Example: Moving TOP SECRET data to Secret level

CONFIDENTIALITY of DATA ONLY!!NO READ UP, NO WRITE DOWN**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Clark-Wilson model attributes

A

a. Preventing unauthorized users from making modifications to data or programs
b. Preventing authorized users from making improper or unauthorized modifications
c. Maintaining internal and external consistency of data and programs

INTEGRITY ONLY!!SUBJECT|PROGRAM|OBJECT**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TPM hardware restrict users from doing?

A

Prevents someone from accessing an encrypted drive by installing it in another computer.

Definition: Trusted Platform Module (TPM) is a hardware security technique that stores an encryption key on a chip on the motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric cryptosystem

A

sender of a message always encrypts the message using the recipient’s public key.

Recipient decrypts with recipients private key

Sender creates digital signature using sender private key. Recipient verifies signature using sender public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a “salt” in terms of passwords?

A

salt is a random value added to a password before it is hashed by the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of fire suppression system fills with water when the initial stages of a fire are detected and then requires a sprinkler head heat activation before dispensing water?

A. Wet Pipe
B. Dry Pipe
C. Deluge
D. Preaction

A

D.

A preaction fire suppression system activates in two steps. The pipes fill with water once the early signs of a fire are detected. The system does not dispense water until heat sensors on the sprinkler heads trigger the second phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What IPSEC configuration provides confidentiality for the content of packets?

A

ESP

Encapsulating Security Payload (ESP) protocol provides confidentiality and integrity for packet contents. It encrypts packet payloads and provides limited authentication and protection against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 defining characteristics of cloud based technologies?

A
  1. On demand self service
  2. Broad Network Access
  3. Resource Pooling
  4. Rapid Elasticity
  5. Measured Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 cloud service models that everyone agrees on?

A
  1. SAAS (Software as a service)
  2. PAAS (Platform as a Service)
  3. IAAS (Infrastructure as a Service)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the four cloud deployment models?

A
  1. Private
  2. Community (Private cloud within Private
    Cloud)
  3. Public (World Wide Web)
  4. Hybrid (Mix of two or more of above)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Type I Hypervisor

A

Native Bare Metal

Example: eSXI, HYPER V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Type II Hypervisor

A

Hosted on a client O/S

Example: Virtual Box, Parallels. Application that runs on top of OS that provides virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define this OWASP attack type:

When un-trusted data is sent to an interpreter as part of a command query.

A

Injection.

SQL, NOSQL, OS, LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define this OWASP attack type:

Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently.

A

Broken Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Attackers may steal or modify weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser.

A

Sensitive Data Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define this OWASP attack type:

Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.

A

XML External Entities (XXE)

Applications and in particular XML-based web services or downstream integrations might be vulnerable to attack if:

• The application accepts XML directly or XML uploads, especially from
untrusted sources, or inserts untrusted data into XML documents, which is then parsed by an XML processor.

• Any of the XML processors in the application or SOAP based web services has
document type definitions (DTDs) enabled. As the exact mechanism for disabling DTD processing varies by processor, it is good practice to consult a reference such as the OWASP Cheat Sheet ‘XXE Prevention’.

• If your application uses SAML for identity processing within federated
security or single sign on (SSO) purposes. SAML uses XML for identity assertions, and may be vulnerable.

• If the application uses SOAP prior to version 1.2, it is likely susceptible
to XXE attacks if XML entities are being passed to the SOAP framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define this OWASP attack type:

Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users’ accounts, view sensitive files, modify other users’ data, change access rights, etc…

A

Broken Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define this OWASP attack type:

The most commonly seen issue. The result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely configured, but they must be patched and upgraded in a timely fashion.

A

Security Misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define this OWASP attack type:

flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define this OWASP attack type:

Often leads to remote code execution. Even if deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks.

A

Insecure Deserialization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define this OWASP attack type:

Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts.

A

Using Components with Known Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define this OWASP attack type:

Insufficient logging and monitoring,
coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data.

A

Insufficient Logging & Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where should server rooms be located in a building?

A

a. should be located in or near center of building
b. should not be on ground floor if possible
c. should not be on top floor if possible
d. should not be in basement if possible
e. should be away from water, gas, sewer runs if possible
f. walls of space should have a MINIMUM fire rating of 1 hour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How many bits of keying material does the Data Encryption Standard use for encrypting information?

A. 56 bits
B. 64 bits
C. 128 bits
D. 256 bits

A

A.

DES uses a 64-bit encryption key, but only 56 of those bits are actually used as keying material in the encryption operation. The remaining 8 bits are used to detect tampering or corruption of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which one of the following is not one of the basic requirements for a cryptographic hash function?

A. The function must work on fixed-length input.

B. The function must be relatively easy to compute for any input.

C. The function must be one way.Your selection is incorrect

D. The function must be collision free.

A

A.
Hash functions must be able to work on any variable-length input and produce a fixed-length output from that input, regardless of the length of the input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CC Evaluation Assurance Levels (EALs)

EAL 1

A

Functionally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CC Evaluation Assurance Levels (EALs)

EAL 2

A

Structurally tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CC Evaluation Assurance Levels (EALs)

EAL 3

A

Methodically tested & checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CC Evaluation Assurance Levels (EALs)

EAL 4

A

Methodically designed, tested, reviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CC Evaluation Assurance Levels (EALs)

EAL 5

A

Semi-formally designed & tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CC Evaluation Assurance Levels (EALs)

EAL 6

A

Semi-formally verified, designed, & tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CC Evaluation Assurance Levels (EALs)

EAL 7

A

Formally verified, designed, tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does GPR (Ground Potential Rise) protect from?

A

Lightning Strikes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Whats an ideal temperature range?

A

60 - 75 degrees

15 - 23 degrees Celsius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Whats an ideal humidity range?

A

40 - 60%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How many stages are there to a fire?

A

4

  1. Incipient Stage
  2. Smoke Stage
  3. Flame Stage
  4. Heat Stage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is Class A Fire extinguishers used for and whats the suppression material?

A

Common Combustibles;

Water and Soda Acid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is Class B Fire extinguishers used for and whats the suppression material?

A

Liquids;

C02, Halon Equivalent, soda acid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is Class C Fire extinguishers used for and whats the suppression material?

A

Electrical;

C02, Halon Equivalent

47
Q

What is Class D Fire extinguishers used for and whats the suppression material?

A

Metal;

Dry Powder

48
Q

What are the 5 fire detection system types?

A
  1. Fixed Temperature
  2. Rate of rise detection
  3. Flame Actuated
  4. Smoke Actuated
  5. Incipient smoke detection
49
Q

What are the 4 types of water suppression system types?

A

wet pipes - Constant Water in them

dry pipes - do no have water in them

pre-action - incorporate a detection system

deluge - another type of dry pipe except all sprinkler heads are in the open position.

50
Q

What are the gas systems used in fire suppression?

A

a. FM-200
b. CEA-410 or CEA-308
c. Argon
d. Aero-K

51
Q

What are the goals of cryptography?

A
  1. Confidentiality
  2. Integrity
  3. Authentication
  4. Non repudiation
52
Q

“A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.”

A

Kerckoffs Principle

53
Q

How is logical operator “AND” also represented?

A

” ^ “

54
Q

How is logical operator “OR” also represented?

A

” v “

55
Q

How is logical operator “XOR” also represented?

A

” ⊕ “

56
Q

How is logical operator “NOT” also represented?

A

” - “

or

” ! “

57
Q

Modulo Function is defined as what?

A

Remainder left over AFTER a division operation has been performed.

Example: 8 MOD 6 = 2

6 goes into 8 ONCE with TWO left over

58
Q

easily produces output, but makes it impossible to retrieves the input values

A

One-Way Function

59
Q

Ability to prove your knowledge of a fact to a third party WITHOUT revealing that fact to the third party. “Show but don’t tell”

A

Zero knowledge proof

60
Q

Cryptographic systems of symbols that represent words or phrases, but are not always secret & DO NOT provide confidentiality.

A

Codes

61
Q

ALWAYS meant to hide the meaning of a transmitted message using a variety of techniques to achieve some measure of confidentiality.

A

Ciphers

62
Q

Only TRULY UNBREAKABLE cryptosystem, but only if implemented correctly

A

One-Time pad (Vernam Cipher)

63
Q

One of the earliest documented cipher systems, using substitution

A

Caeser Cipher

64
Q

A method of encrypting alphabetic text by using a series of different Caeser ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.

A

Vigenere Cipher

65
Q

Used in cases where the use of encryption is not necessary but yet the fact that no encryption is needed must be configured in order for the system to work.

A

Null Cipher

66
Q

Sender and receiver agree on a key word, for example, pizza. A table is the constructed used that word and then the rest of the alphabet - skipping over the letters already appearing in the key and using I and J as the same letter.

A

Playfair Cipher

67
Q

Which cryptographic algorithm uses only a SINGLE KEY?

A

Symmetric

68
Q

Different encryption keys generate the same cipher text from the same plain text message

A

Key Clustering

69
Q

DES , 3DES, IDEA, BLOWFISH , SKIPJACK and AES are all forms of what type of algorithm?

A

Symmetric

70
Q

How many keys do you need with asymmetric algorithm and 4 participants?

A

6 Keys

n ( n - 1 ) / 2 ….Where “n” is the number of participants

71
Q

Used to be the standard for the symmetric encryption for many governments and militaries but no longer because it is considered compromised?

A

DES

72
Q

How many bits is the KEY SPACE for DES?

A

56 bit key

8 bits are reserved for parity operations

73
Q

How many bits is the KEY SPACE for 2-DES?

A

112 bit key

74
Q

How many bits is the KEY SPACE for 3-DES?

A

168 bit key

75
Q

How many rounds of XOR does DES use?

A

16 rounds

Also may be referred to as “16 rounds of encryption”

76
Q

How many bits is the BLOCK space that DES operates on?

A

64 bits

77
Q

Which encryption algorithm contains the following:

64 bit block cipher and 128 bit key

A

IDEA

78
Q

Which encryption algorithm contains the following:

64 bit block cipher and variable key from 32 to 448 bits

A

Blowfish

79
Q

Which encryption algorithm contains the following:

64 bit block cipher and 80 bit key. Also has capability to use key escrow for encryption keys.

Was considered the basis for the US governments attempt’s at the clipper chip

A

Skipjack

80
Q

Which encryption algorithm contains the following:

128 bit block cipher with variable keys from 128, 192 and 256

A

AES

81
Q

What are the rounds that correspond with the following AES key lengths below:

128 bit key
192 bit key
256 bit key

A

128 bit key requires 10 rounds
192 bit key requires 12 rounds
256 bit key requires 14 rounds

82
Q

What was the original name for the AES algorithm?

A

Rijndael Algorithm

83
Q

Rijndael Algorithm (AES) consists of 4 major operations. What are those?

A
  1. Substitute Bytes
  2. Shift Rows
  3. Mix Columns
  4. Add Round Key
84
Q

Which encryption algorithm contains the following:

64 bit block and keys between 40 and 128 bits in length. Rounds are 12 -16

A

CAST-128

85
Q

Which encryption algorithm contains the following:

128 bit block with keys of 128, 192, 160, 224 and 256. Performs 48 rounds and is described in RFC2612

A

CAST-256

86
Q

Which encryption algorithm contains the following:

128 bit block with keys up to 256 bits

A

TwoFish

87
Q

Which encryption algorithm contains the following:

Variable block size 32, 64, 128 and with key length of 0 to 2048 bits

A

RC-5 (RIVEST)

88
Q

When implementing STREAM encryption. It is considered what?

A

synchronous

89
Q

When implementing BLOCK encryption. It is considered what?

A

asynchronous

90
Q

Secure holding facility for cryptographic key

A

key escrow

91
Q

ALL cryptosystems have a limited lifespan based on their ability to withstand attacks

A

Cryptographic Lifecycle

92
Q

Most famous asymmetric crypto system. Named for its creators:
Rivest
Shamir
Adleman

A

RSA

93
Q

Developed at approx same time as RSA and also based on difficulty of factoring but took different approach. Broken in 1984

A

Merkle-Hellman Knapsack

94
Q

Based on an extension of the diffie-hellman algorithm published without a patent so its freely available.

A

El Gamal

95
Q

Based on the elliptic curve discrete logarithm problem

A

ECC Elliptic Curve Cryptography

96
Q

Take a message and mix it with a hash to derive a unique output value

A

hash function

97
Q

RSA 5 basic requirments of a hash function

A
  1. input can be of any length
  2. output has fixed length
  3. hash function is easy to compute for given input
  4. hash function is “one-way”; almost impossible to figure out the input based on the output
  5. hash function is collision free; almost impossible to find two messages that will produce the same hash value
98
Q

What hashing algorithm uses the following:

160 bits using 512 bit block size for processing the message

A

SHA-160

99
Q

What hashing algorithm uses the following:

224 bits using 512 bit block size for processing the message

A

SHA-224

100
Q

What hashing algorithm uses the following:

256 bits using 512 bit block size for processing the message

A

SHA-256

101
Q

What hashing algorithm uses the following:

384 bits using 1024 bit block size for processing the message

A

SHA-384

102
Q

What hashing algorithm uses the following:

512 bits using 1024 bit block size for processing the message

A

SHA-512

103
Q

Preferred hashing algorithm also known as Keccak Algorithm

A

SHA3

104
Q

All of the following are considered what?

HAVAL - bit= 128,60,192,224,256

MD2,4,5 - bit = 128

Hash Message Authentication Code (HMAC) - bit = Variable

RIPEMD- bit = 160

A

Hashing Functions

105
Q

Comprehensive system required to provide public-key encryption and digital signature services. It has three primary purpose:

  1. Publish public keys/certs
  2. Certify that the key is tied to individual or entity.
  3. Provide verification of the validity of a public key.
A

PKI - Public Key Infrastructure

106
Q

Protects the entire communication circuit by creating an encrypted tunnel between two end points, encrypting ALL OF THE DATA, including the header, trailer, address and routing info

A

Link Encryption

Example: SSL/TLS

107
Q

Protects communications between two parties and is performed independently of link encryption. Just encrypts the data payload itself, not any of the routing information, so it is quicker.

A

End-To-End Encryption

Example: SSH

108
Q

Most commonly used VPN protocol IP Traffic ONLY!

  1. Authentication Header - Authentication, integrity and non-repudiation
  2. ESP Encapsulating Security Payload - Confidentiality with limited authentication, Operates at Layer 3 and can be deployed in Transport or Tunnel Mode
A

IPSec

IPSec must be deployed with AH and ESP!!!!

109
Q

Provides security support in IPSec by negotiating, establishing, modifying and deleting security associations (SAs).

Four Requirements Include:

  1. Authenticate communicating peers
  2. Create & Modify security associations
  3. Provide key generation mechanisms
  4. Protect against threats
A

ISAKMP - Internet Security Association and Key Management

110
Q

Negotiated by ISAKMP during the initialization of an IPSec session. It Requires a simplex connection, or a “one-way” transmission agreement.

A

Security Association (SAs)

111
Q

Algebraic manipulation attempting to reduce the complexity of the algorithim by focusing on the lofic of the algorthim

A

Analytic Attack

112
Q

Exploitiung weakness in the way in th which the cryptosystem has been architechted and implemented

A

Implementation Attack

113
Q

Exploits weakness such as floating point errors & an inability to produce truly random numbers

A

Statistical Attack

114
Q

Attempting EVERY POSSIBLE combination until the right one is found.

Ways to enhance this attack:

a. Rainbow Tables
b. Use of special hardware

Ways to defeat:

a. Salt the Passwords
b. pepper
c. Key stretching

A

Brute Force Attack