Exam 2 Flashcards

1
Q

Access Control Approaches Rely on The Following Four Mechanisms

A
  1. Identification- I am a user of the system
  2. Authentication- I can prove I’m a user of the system
  3. Authorization- Here’s what I can do with the system
  4. Accountability- You can track and monitor my use on the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Roles of the Communities of Interest

A

Evaluation of current and proposed risk controls
Determining which options are cost effective
Installing the needed controls
Ensuring that the controls stay effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three commonly used authentication factors

A
  1. Something you know
    Relies on what the unverified user knows. Like password.
  2. Something You Have
    Relies on that an unverified user has and can produce when necessary. Like ID cards
  3. Something That You Are or Can Produce
    Relies on individual characteristics. Like fingerprints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC layer firewall

A

Designed to operate at the media access control sublayer at layer 2 of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application layer proxy firewall

A

capable of functioning as both a firewall and an application layer proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet-filtering firewall

A

Examines header information of data packets that enter a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

Combination of hardware/software that filters information moving between the inside/outside of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encapsulation

A

The native protocol of the client is embedded within the frames of a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

Keeps data private as it travels over the public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Ensures the identification of the remote user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transport Mode

A

Data within an IP packet is encrypted, but the header information is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tunnel Mode

A

Establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy server

A

server that exists to intercept requests for information from external users to minimizing demand on internal servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reverse proxy

A

retrieves internal information to provide to requesting outside users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Clark-Wilson Integrity Model change control principles

A
  • No changes by unauthorized users
  • No unauthorized changes by authorized users
  • Maintain internal and external consistency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDPS Response Techniques

A

Terminating the user session or network connection
Blocking access to the target system or systems
Blocking all access to the targeted information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reasons for an IDPS

A

Intrusion detection
Documentation- Logs data
Attack deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Host based IDPS

A

Resides on a particular device and only monitors that system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network based IDPS

A

Resides on a device connected to a segment of an organizations network and only monitors that segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attack protocol

A

Series of steps used by an attacker to launch an attack

21
Q

Footprinting

A

Research of internet addresses owned by a target organization

22
Q

Fingerprinting

A

Survey of all the target addresses collected during footprinting

23
Q

Attack surface

A

Functions and features a system exposes to unauthenticated users

24
Q

Port scanners

A

Tools used by both attacker and defenders to identify or fingerprint active computers on a network

25
Q

Seven Major Sources of Physical Loss

A
  1. Extreme temperature: heat, cold
  2. Gases: humid or dry air
  3. Liquids: water, chemicals
  4. Living organisms: virus, people, animals
  5. Projectiles: Tangible objects in motion
  6. Movement: Collapse, vibration, slide
  7. Energy anomalies: electrical surge
26
Q

Uninterruptible power supply

A

Ensures delivery of electrical power without interruption

27
Q

Standby/Offline UPS

A

Backup battery that detects interruption in power and activates a transfer switch to provide power through batteries

28
Q

TEMPEST

A

Government program to protect computers from electrical remote eavesdropping by reducing EMR emissions

29
Q

Packet sniffer

A

Software or hardware that can intercept, copy, and interpret network traffic

30
Q

Active vulnerability scanner

A

Application that scans networks for exposed usernames/groups

31
Q

Passive vulnerability scanner

A

Scanner that listens in on a network and identifies vulnerable versions of both server and client software

32
Q

Best Practices for Firewalls

A

All traffic from trusted networks is allowed out
Firewall devices are never to be directly accessible from the public network
SMTP data is allowed but is directed to a well configured gateway
All ICMP data should be denied

33
Q

Static packet filtering

A

Filtering rules need to be developed with the firewall

34
Q

Dynamic packet filtering

A

Can react to events and update or create rules to deal with an event

35
Q

Stateful packet inspection (SPI)

A

Keep track of each network connection between internal and external systems

36
Q

Kerberos

A

Uses symmetric key encryption to validate a user to network resources

37
Q

Kerberos three interactive services

A

Authentication server- Kerberos server that authenticates clients and servers

Key Distribution Center- generates and issues session keys

Kerberos ticket granting service- provides tickets to valid clients who request services

38
Q

VPN

A

A private secure network operated over a public network

39
Q

Hybrid VPN

A

combination of trusted and secure VPN implementations

40
Q

Secure VPN

A

uses security protocols to encrypt traffic transmitted across unsecure networks

41
Q

Trusted VPN

A

VPN that uses leased circuits

42
Q

Know yourself

A

Understand the current information in your organization

43
Q

Know the enemy

A

Identify threats facing the organization

44
Q

Risk appetite| tolerance

A

The quantity of risk that organizations are willing to accept

45
Q

Residual risk

A

Risk to information that remains after current controls are applied

46
Q

Attack success probability

A

number of successful attacks that are expected to occur within a specified time period

47
Q

Likelihood

A

The probability that a vulnerability within an organization will be attacked

48
Q

Risk control

A

Application of controls that reduce risk to an organizations assets