Domain 5 Flashcards

1
Q

First step to IT security

A

Baseline security plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 types of power failure

A

1) blackout
2) brownout
3) sags, spikes, surges
4) EMI (electromagnetic interference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fire suppression systems not safe for human life

A

-Halon systems
-Carbon dioxide

Can use:

-argonite
-FM-200 (preferred)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mandatory access controls (MACs)

A

Logical access control filters used to validate access credentials that can’t be controlled/modified by normal users or data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary access controls (DACs)

A

Controls that may be configured or modified but the users or data owners

*DACs should be aligned with MACs to be effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

An authentication service that validates services and users in a DCE (distributed computing environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service (DoS)

A

Remote users may not be able to access data/apps vital to carry out day to day business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1st step in implementing logical access controls

A

Prepare an inventory of IS resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most effective control against identity theft

A

Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication (3)

A

-something you know (password)
-something you have (token card)
-something you are/do (biometric)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 steps to implement logical access controls

A

1) inventory of IS resources
2) classify IS resources
3) perform grouping/labeling of IS resources
4) create access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default deny access

A

Allows approved traffic and rejects all other traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Default allow access

A

Denies specific traffic and allows all other traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False rejection rate
(FRR or type-1error rate)

A

of times an individual w/ authority to use the system is falsely rejected by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Failure to enroll rate (FER)

A

Proportion of openly who fail to be enrolled successfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

False acceptance rate
(FAR or type-2 error rate)

A

of times an individual NOT granted authority to use the system is falsely accepted by the system

  • best performance indicator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cross error/equal error rate
(CER/EER)

A

Rate at which FAR and FRR are equal
-lowest is the most effective
-overall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Biometric attacks

A

Replay
Brute force
Cryptographic
Mimic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Replay (biometric attack)

A

Residual biometric characteristic is used by attacker to gain access (ex fingerprint left on device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Brute force (biometric attack)

A

Sending numerous different biometric samples to a biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cryptographic (biometric attack)

A

Targets algorithm or encrypted data transmitted between biometric device and access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Mimic (biometric attack)

A

Attacker attempts to fake the biometric characteristics similar to those of the enrolled user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What has the highest reliability and lowest FAR

A

Retina/iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Biometric life cycle

A

1) enrollment
2) transmission & storage
3) verification
4) identification/termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Dedicated circuit
Symmetric telecommunication line connecting 2 locations
26
Switched circuit
Does not permanently connect 2 locations, be set up on demand: Circuit switching (telephone network) Packet switching (lower cost)
27
7 layers to OSI architecture
1. Physical (Please) 2. Data link layer (Do) 3. Network layer (Not) 4. Transport layer (Teach) 5. Session layer (Stupid) 6. Presentation layer (People) 7. Application layer (Anything)
28
1. Physical layer
Relates to electrical signal or hardware devices
29
2. Data link layer
Relates to MAC address or bit conversion
30
3. Network layer
Relates to routing or IP address
31
4. Transport layer
Related to -reliable delivery -connection oriented -delivery in proper order -congestion control
32
5. Session layer
Relates to managing connection
33
6. Presentation layer
Converts data into presentable format
34
7. Application layer
Relates to end users
35
LAN components
1. Hub & repeater (dumb device) 2. Switch & bridge (more capable) 3. Router (most capable - layer 3)
36
Layer-2-switches
Devices that can divide and interconnect network segments & help to reduce collision in domains in Ethernet based networks
37
Fiber optics
Most secure mode of data transmission
38
Shielded twisted pair (STP)=
Less crosstalk
39
Unshielded twisted pair (UTP)=
More crosstalk Higher attenuation
40
Attenuation
Wired or wireless - the weakening of signals during transmission (Impacted by length of wire)
41
Crosstalk
Electromagnet interference from one UTP to another twisted pair, normally running in parallel (only wired)
42
EMI (electromagnetic interference)
Disturbance generated by an external source that affects an electrical circuit
43
DHCP (dynamic host configuration protocol)
Protocol to manage network configuration by assigning an IP address & other parameters to every device on a network so they can communicate with other IP networks RISK- access to network port is not restricted
44
Secure shell (SSH)
protocol that uses cryptography to secure encrypted communication, remote login/execution between 2 networked computers or data in transmission -cannot encrypt data at rest (like on USB drives)
45
Latency
The delay that a message or packet will experience on its way from source to destination
46
Middleware
Software employed by Client server applications
47
Firewalls (3)
1. Packet filtering router 2. Stateful inspection 3. a.application level b.circuit level
48
Bastion host
Only host computer that a company allows to be addressed directly from the public network and is designed to protect the rest of its network from exposure -heavily forfeited against attack
49
Proxy server
Stands between internal and external network & will not allow direct communication between 2 networks (Circuit or application level firewall)
50
Packet filtering - firewall
-simplest -network layer (3) -examines header or every packet of data traveling between internet and corporate network
51
Stateful inspection - firewall
-keeps track of destination of each packet that leaves internal network & ensures incoming message matches IP address -complex -network layer
52
A.Application/B.circuit layer- firewall
A. Application layer (7)/most secured -works on concept of bastion host & proxy servers separate for each application B. Session layer (5); works on bastion host and proxy server too but same proxy for all services
53
Firewall implementations (3)
Dual homed Screened host DMZ / screened subset
54
Screened host
-Uses packet filtering router firewall and bastion host -implements basic network layer security and application server security
55
Dual homed
-uses packet filtering router firewall and bastion host but with 2 NIC (network interface cards) -more restrictive -acts to block or filter some or all traffic trying to pass between networks
56
DMZ (demilitarized)/Screened subset
-Most secure -uses 2 packet filtering routers and 1 bastion host -limits supervised available to use -supports network&application level security while defining a separate DMZ network
57
Shadow IT
IT app, took, service, or system used for various purposes but is NOT reviewed/tested/approved
58
Symmetric encryption
-Single key is used to encrypt/decrypt -faster -inexpensive
59
Asymmetric encryption
-2 keys: private & public -slower -expensive -more security tho for sharing
60
Asymmetric encryption - ensure confidentiality
Encrypt using receivers Public key Decrypt using receivers private key
61
Asymmetric encryption - ensure authenticity & integrity
Create a hash of the message and encrypt using senders private key
62
Defense-in-depth
Security arrangement includes the use of multiple security mechanisms that support & complement each other -centralized firewalls + logical access controls
63
Secure socket layer (SSL)
Uses cryptographic functions to protect the confidentiality, reliability, and integrity of private data traveling through the internet
64
SBC
Session border controllers - deployed to protect VoIP networks & DoS/DDoS attacks -prevents fraud -encrypts signals -provides quality of service
65
DDoS
Distributed denial of service - attack aims to bring down VoIP infrastructure by flooding with heavy traffic from multiple sources
66
PBX (private branch exchange)
Computer based switch/basically an in house phone company for org -protection of PBX is high priority
67
Segregation of VoIP infrastructure using VLAN ensures
Security and reliability
68
Address resolution protocol (ARP)
Communication protocol used to map IP and MAC addresses -data traffic in VoIP can be eavesdropped by corrupting ARP
69
Digital signature ensures
(Email) authenticity
70
War driving
Used by hackers in wireless networks -most relevant technique to test the security of an orgs WiFi
71
Botnets
Zombie computers/used to run malicious software for DDoS attacks
72
Buffer overflow
Common software coding mistake; more data in a buffer than can handle and overflows to adjacent storage
73
Data diddling
No preventative controls Data is altered as it entered a computer system
74
Man in the middle attack
Attacker interferes while 2 devices are establishing a connection -avoids 2 factor authentication
75
Spoofing
Appearing to originate from an internal source
76
IDS (intrusion detection systems) components
Sensor - collects data Analyzer User interface Admin console
77
Where should the IDS be located in a network
Between the firewall and the orgs internal network
78
Statistical based IDS generates the most
False positives
79
Neural network IDS
Creates database & is most effective in detecting fraud
80
Honeypot
Software application, that pretends to be a vulnerable server on the Internet, and is not set up to actively protect against break-ins, so it acts as a decoy system that lures hackers 
81
IDS limitations
1. Will not be able to detect application level vulnerabilities. 2. Back doors into applications 3. IDS will not be able to detect encrypted traffic
82
Programmers should not have access to the
Production database
83
Hash values ensure data has
Not been changed during transmission
84
Data mining
Technique used to detect trends or patterns of transactions or data
85
Storage devices (usb) can be a vehicle for
Infecting other computers with malware
86
Advanced encryption standard (AES) provides
Strongest encryption and greatest assurance that data is protected
87
Steganography
-Technique for concealing the existence of messages or information -digital water marking -hides date within data
88
Digital signatures provide
Integrity
89
Message digest
Calculated & included in a digital signature to prove the message hasn’t been altered
90
Encapsulation or tunneling
Technique used to encrypt the traffic payload so that it can be securely transmitted over an insecure network
91
For confidentiality and authenticity; sign a message using
The senders private key & Encrypt using receivers public key
92
Digital signatures - encrypt & decrypt
Encrypt with receivers public key and decrypt with senders private key
93
USB
Universal Serial Bus
94
Which of the following is the most reliable method to ensure identity of sender for messages transferred across Internet ? 
Digital certificates (not digital signatures - identity is confirmed by DC)