Domain 6 - Security Assessment and Testing Flashcards

1
Q

Security Review

A

Conducted by system maintenance or security personnel

Goal is determine vulnerabilities within a system. Also known as a vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Audit

A

Conducted by 3rd party

Determines the degree to which required controls are implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Penetration Testing

A
Ethical hacking to validate discovered weaknesses
Red Teams (Attack)/Blue Teams (Defend)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST SP 800-42

A

National Institute of Standards and Technology

Guideline on Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero Knowledge

A

Team has no knowledge of the target and must start with only information that is publically available. This simulates an external attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Partial Knowledge

A

The team has limited knowledge of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Full Knowledge

A

This simulates an internal attack. The team has full knowledge of network operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blind

A

The assessors have only publicly available knowledge. The network teams knows that testing is taking place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Double Blind

A

The assessors have only publicly available knowledge, but in this instance the network teams do NOT know the test is taking place. This will allow evaluation of incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Targeted Testing

A

External consultants work with internal staff to focus on specific systems or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Model

A
Layer 1 Physical
Layer 2 Data Link
Layer 3 Network
Layer 4 Transport
Layer 5 Session
Layer 6 Presentation
Layer 7 Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTP

HHTPS

A

80

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP

A

20/21

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RDP

A

3389

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS

A

53

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FTPS

A

989/990

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TFTP

A

69

Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCP

A

67/68

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ARP

RARP

A

Address Resolution Protocol

Reverse Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ethernet standard

A

802.3

CSMA/CD Carrier Sense Multiple Access w/ Collison Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Wireless Standard

A

802.11

CSMA/CA Carrier Sense Multiple Access w/ Collison Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vlan Standard

A

802.1q

23
Q

WEP

Auth, Encrypt, Integrity

A

PSK Pre Shared Key
Wired Equivalent Protocol encrypted with RC4(Stream Cipher)
integrity check by CRC Cyclic redundancy check
64, 128,256 bit key, but -24 for IV(Initialization Vector) so actual 40,104,232 bit key

24
Q

WPA Personal

Auth, Encrypt, Integrity

A

PSK
encrypted by TKIP(Temporary Key Internet Protocol) with RC4
Integrity by MIC Message Integrity Check
128 bit key + 48 bit IV

25
Q

WPA Enterprise

Auth, Encrypt, Integrity

A

802.1x with RADIUS Server
encrypted with TKIP and RC4
integrity by MIC
128 bit key + 48 bit IV

26
Q

WPA2 Personal

Auth, Encrypt, Integrity

A

PSK
encrypted CCMP(block-chain) with AES(block Cipher)
integrity CBC-MAC Chain Block Cipher MAC
256 bit key

27
Q

WPA2 Enterprise

Auth, Encrypt, Integrity

A

802.1x with RADIUS Server
encrypted CCMP with AES
integrity CBC-MAC
256 bit key

28
Q

RIPv1

Interior/exterior, type,class

A

IGP, Distance Vector, classful

29
Q

IGRP

Interior/exterior, type,class

A

IGP, Distance Vector, classful

Cisco proprietary

30
Q

RIPv2

Interior/exterior, type,class

A

IGP, Distance Vector,classless

31
Q

EIGRP

Interior/exterior, type,class

A

IGP, Distance Vector, classless

Cisco proprietary

32
Q

OSPF

Interior/exterior, type,class

A

IGP, Link-state, Classless

33
Q

IS-IS

Interior/exterior, type,class

A

IGP, Link-state, Classless

34
Q

BGP

Interior/exterior, type,class

A

EGP, Path-vector, Classless

35
Q

IAAA

A
Identification:
Make a claim (userid etc)
Authentication:
Provide support (proof) for your claim
Authorization:
What rights and permissions you have
Auditing:
Accountability—matching actions to subjects
36
Q

Access Control Types

A

Logical
Physical
Administrative

37
Q

Authentication Type I

A

Something you know

38
Q

Authentication Type II

A

Something you Have

39
Q

Authentication Type III

A

Something you are

40
Q

Type I Error

A

False Rejection(FRR)–A legitimate user is barred from access. Is caused when a system identifies too much information. This causes excessive overhead.

41
Q

Type II Error

A

False Acceptance(FAR)—An impostor is allowed access. This is a security threat and comes when a system doesn’t evaluate enough information

42
Q

CER

A

(Crossover Error Rate) The level at which the FAR and FRR meet. The lower the number, the more accurate the system.

43
Q

Race Condition

A

try to cause authorization to happen before authentication

44
Q

Single Sign On

A
Ease of use for end users
Centralized Control
Ease of administration
Kerberos
LDAP
Sesame
KryptoKnight
45
Q

Kerberos

A

A network authentication protocol designed from MITs project Athena. Kerberos tries to ensure authentication security in an insecure environment
Port 88
Allows for single sign on
Never transfers passwords
Uses Symmetric encryption to verify Identifications
Avoids replay attacks

46
Q

Kerberos Components

A

Essential Components:
AS (Authentication Server): Allows authentication of the user and issues a TGT
TGS: After receiving the TGT from the user, the TGS issues a ticket for a particular user to access a particular service
KDC (Key Distribution Center) a system which runs the TGS (Ticket Granting Service) and the AS (Authentication Service)
Ticket: Means of distributing Session Key
Principles (users, applications, services)
Kerberos Software (integrated into most Operating Systems. MS Windows 2000 and up support Kerberos)
Main Goal: User needs to authenticate himself/herself without sending passwords across the network—needs to prove he/she knows the password without actually sending it across the wire.

47
Q

SESAME

A

European technology, developed to extend Kerberos and improve on it’s weaknesses
Sesame uses both symmetric and asymmetric cryptography.
Uses “Privileged Attribute Certificates” rather than tickets, PACS are digitally signed and contain the subjects identity, access capabilities for the object, access time period and lifetime of the PAC.
PACS come from the Privileged Attribute Server.

48
Q

DAC

A

Discretionary Access Control
Security of an object is at the owner’s discretion
Access is granted through anACL (Access Control List)
Commonly implemented in commercial products and all client based systems
Identity Based

49
Q

MAC

A

Mandatory Access Control
Data owners cannot grant access!
OS makes the decision based on a security label system
Subject’s label must dominate the object’s label
Users and Data are given a clearance level (confidential, secret, top secret etc)*
Rules for access are configured by the security officer and enforced by the OS.

50
Q

RBAC

A

Role Based Access Control
Uses a set of controls to determine how subjects and objects interact.
Don’t give rights to users directly. Instead create “roles” which are given rights. Assign users to roles rather than providing users directly with privileges.

51
Q

AAA

A

Authentication
Authorization
Auditing

52
Q

RADIUS

A
Port 1812, 1813
UDP
3 separate processes for AAA
only encrypts user/pass
uses Industry Standard
53
Q

TACACS+

A
Port 49
TCP
one process for AAA
encrypts everything
Cisco Devices
54
Q

Guideline on Security Testing

A

National Institute of Standards & Tech SP 800-42