Domain 3.0: Implementation Flashcards

1
Q

you can make LDAP traffic confidential and secure by using ____ technology operating over port ___

A

TLS, 636 (port LDAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

web traffic is unencrypted over ____ occurs by default over port ____

A

HTTP, 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encrypted web traffic over ____ occurs by default over port _____

A

HTTPS, 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTP SSH uses ___ port ____ by default

A

TCP, 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

port security is a layer ___ traffic control feature that enables individual switch ports to be configured to allow only specified number of source MAC addresses coming in through the port

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ protection makes additional checks in Layer 2 switched networks

A

loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a ____ guard is a firewall feature to control network activity associated with DoS attacks

A

flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ code analysis is a white box software testing process for detecting bugs early in the program development

A

static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ code analysis is based on observing how the code behaves during execution

A

dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is a black box software testing process by which semi random data is injected into a program or protocol stack to detect bugs

A

fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ provides a safe execution environment fo untrusted programs

A

sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ environments should be isolated from development environments

A

testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ environments reduce the risk of introducing issues before solutions are deployed in production

A

staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______ can establish patterns of use that later can help identify variations that identify unauthorized access attempts

A

baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ ____ use embedded systems with an os on the included chip

A

smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the ______ SDLC (software development life cycle) model starts with a defined set of requirements and a well developed plan, and adjustments are confined to the current development stage

A

waterfall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the ____ SDLC model starts with less rigorous guidelines and allows for adjustments during the process

A

agile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ ____ includes security in the SDLC, ensuring that security is built in during the development process

A

secure devOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a __ _____ continually compiles, builds, and tests each new version of code committed to the central repository without user interaction

A

CI server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_______ means that a valuable program, configuration or server will never be modified in place

A

immutability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ _____ involves disabling unnecessary ports and services

A

system hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

to keep an attacker from exploiting software bugs, an organization must continually apply manufacturers’ ___ and _____

A

patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what port is Netstat commonly used for, purpose

A

15, lists active processes and who launched them, rarely used due to security concerns. Also same port as B2 Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what port is FTP commonly used

A

20 or 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
port SSH/SFTP/SCP
22
26
port telnet
23 client/server app protocol that provides access to virtual terminals of remote systems on local area networks or the Internet
27
port SMTP
25, simple mail transfer protocol, insecure
28
port DNS
53
29
port HTTP
80
30
port NTP (network time protocol) and purpose
123 time synchronization, replaced with NTPsec port 4460
31
port LDAP, purpose
389 lightweight directory access protocol reading and writing directories over an IP network. to query and update an X.500 directory
32
port HTTPS
443
33
port LDAPS
636
34
port FTPS
989 and 990
35
port RADIUS
1812
36
port RDP, purpose
3389, remote desktop protocol--connecting to another computer on the same network
37
____ chips are secure cryptoprocessors used to authenticate hardware devices
TPM
38
a ___ ____ checker tool computes a cryptographic hash and compares the result to known good values to ensure that the file has not been modified
file integrity
39
____-_____ methods detect known signatures or patterns
signature-based
40
a ___ _______ is used to allow multiple external users to access internal network resources using secure features that are built into the device. they are deployed when a single device needs to handle a very large number of VPN tunnels
VPN concentrator
41
____ offers a method of enforcement which helps ensure that computers are properly configured
NAC (network access control)
42
___ ____ is a model that provides a granular and dynamic access control, regardless of where the user or application resides, and doesn't place trust in the entire network
zero trust
43
a ____ ____ is a small network between the internal network and the Internet that provides a layer of security and privacy
screened subnet
44
____ acts as a liaison between an internal network and the Internet across a routing device. it allows multiple computers to connect to the Internet using one IP address
NAT (network address translation)
45
network segmentation, _____, and segmentation are effective controls an organization can implement to mitigate the effect of a network intrusion
isolation
46
___ ____ are physically isolated machines or networks
air gaps
47
network taps, ____, and mirror ports are the primary methods used to get network traffic to network monitoring tools
SPAN (switched port analyzer)
48
the purpose of a ___ is to unite network nodes logically into the same broadcast domain, regardless of their physical attachment to the network
VLAN
49
___ ___ is managed by 2 basic methods: knowledge based and behavior based detection
intrusion detection
50
an ___ monitors packet data by using behavior-based (to identify anomalies) or knowledge-based methods, operating in network based or host based configurations
IDS (intrusion detection system)
51
___ and _____ are designed to catch attacks in progress within a network, not just on individual machines or the boundary between private and public networks
NIDSs (network intrusion detection systems) and NIPSs (network intrusion prevention systems)
52
____ ____ can be placed between the private network the Internet for Internet connectivity or can be placed internally for web content caching
proxy servers
53
firewalls separate external and internal networks and include the following types: _____-____ firewalls (network layer/layer 3) ____-____ firewalls, including circuit level (session layer/layer 5) and application level/level 7 gateways ____ _____ firewalls (application/layer 7)
packet filtering, proxy service, stateful inspection
54
a _____ firewall works as a basic access control list filter
stateless
55
_____ firewalls are a deeper inspection firewall type that analyze traffic patterns and data flows, often combining layered security and known as next gen firewalls
stateful
56
_____ ____ methods, from the least secure to the most secure, include open authentication, shared authentication, EAP
wireless access methods
57
___-___ requires a password shared by all devices on the network
WPA-personal
58
____-___ requires certificates and uses an authentication server from which keys are distributed
WPA-enterprise
59
___ and ___ favor CCMP over TKIP common to WPA. TKIP should still be used for systems that are unable to support ____
WPA2, WPA3, 802.1i
60
EAP authentication protocols include EAP-TLS, _____, EAP-TTLS, and EAP-FAST. only ___ requires a client certificate, and only ___ does not require a server certificate
PEAP EAP-TLS, EAP-FAST
61
EAP is an _______ framework and is used by WPA, WPA2, and WPA3 for authentication
authentication
62
_____ encapsulates EAP in a TLS tunnel and only requires a certicate on te server
PEAP
63
______ and rooting mobile devices removes restrictions imposed by the manufacturer and can introduce risk
jailbreaking
64
employees who leave an organization should have their accounts ____ but not deleted
disabled
65
generic accounts used by multiple users must be _____
prohibited
66
when working ____ controls, 2 models exist for the assignment of permissions and rights: ____ ____ and role/group based
logical, user
67
too many failed authentication attempts should incur a penalty, such as account _______
lockout
68
enforcing password history prevents users from _____ old passwords
reusing
69
auditing user permissions is a common method for identifying access _____
violations
70
a _____ system allows accessibility from each domain accounts in one area can be granted access rights to any other resource, whether local or remote within the domains
federation
71
____ ____ ______ includes RADIUS or TACACS+
re,pte access authentication
72
______ provides authentication and authorization functions in addition to network access accounting functions, but it does not provide further access control
RADIUS
73
____ supports mutual authentication, protecting against on path attacks. port #
kerberos, port 88
74
using ___ is strongly discouraged because user passwordds are easily readable
PAP
75
____ provides authorization services and does not provide authentication such as ____ and ____
OAuth, OpenID, and SAML
76
____ offers SSO capabilities
SAML
77
the ___ is the source of a username and password and authenticates the user. the __ provides service to the user
IdP, SP
78
access controls includes _____, ____, ____, and _____
MAC, DAC, ABAC, and RBAC
79
____ and ____ cards provide smart card functions for identity and authentication
CACs, PIV
80
implicit ____ is an access control practice in which resource availability is restricted to only logins that are explicitly granted access
deny
81
PKI relies on _____ key cryptography using certificates, which are digitally signed blocks of data issued a CA (certificate authority)
asymmetric
82
a ___ is generated and submitted before a CA (certificate authority) signs a certificate
CSR
83
a root ___ should be taken offline to reduce the risk of key compromise because this would compromise the entire chain or system
CA
84
the 3 types of validated certificates are: ___, ____, and ___
DV, OV, and EV
85
___ certificates provide the highest level of trust and require the most effort for a CA (certificate authority) to validate
EV
86
___ and PFX certificates are binary encoded; ___ and P7B certificates are ____ encoded, and the contents can easily be cut and pasted
DER PEM ASCII
87
ensuring a certificates validity is accomplished through a ___ or ____
CRL, OCSP
88
____ stapling puts the responsibility of ____ requests on the web server instead of on the issuing CA (certificate authority)
OCSP (for both)
89
_________ protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network. Technically has 2 ports
SMB (server message block), port 139 (older version ran on top of NetBIOS allows computers to talk to each other over the same network) port 445 (after Widows 2000, runs on top of TCP works over the Internet)
90
____ _____ stores private key with a trusted 3rd party
key escrow