Exam 3 Flashcards

1
Q

Define Plain/Clear Text & Cipher text.

A

Plain/Clear Text – the original, unaltered data. Not always “text,” but rather, the data.

Cipher Text –data that has been converted into an encrypted form using an algorithm. Can be decrypted using an algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Know what hashes are and why they are used?

A

Hashing – one-way encryption that cannot be reversed (in theory) & provides assurance of data integrity.

  • A hash value of a given data set will never change unless the data set changes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which MD algorithms are broken?

A

MD2, MD4, & MD5 – “MD” stands for “message digest”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What a collision attack is? what the code for this?

A

Collision Attacks – an attack that tries to find 2 different message data sets with the same hash.

  • If 2 different data sets result in the same hash value when run through a hashing algorithm, that algorithm is broken.
    Ex: hash(m1) = hash(m2)

CODE// hash (p1 | md) = ct
hash (p2 | md) = ct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What needs to be understood with Symmetric encryption?

A

Symmetric Cryptography – Any cryptographic algorithm that uses a single key to both ENCRYPT and DECRYPT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two of the listed symmetric algorithms are broken?

3DES, Blowfish, DES, AES, RC2, RC4, RC5, RC6, IDEA

A

DES is broken and that RC4 (also broken) was used in WEP for home routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Cipher & Key.

A

Cipher – the algorithm used for encrypting plain text into cipher text.

Key – a discrete piece of information, usually random in nature, that “unlocks” the cipher text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two biggest weaknesses of symmetric encryption?

A

Symmetric encryption lacks nonrepudiation and secure key sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two keys that asymmetric encryption use?

A

two keys: private and public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how a session key is generated.

A

The client accepts the server public key,
generates a session key using agreed-upon algorithm, then encrypts the session key using the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Between a public and private key, which is the one that can decrypt anything?

A

Only the private key can decrypt anything encrypted with the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For RSA, know the formulas to encrypt and decrypt.

A

Encrypt: t^e (mod n) = c
Decrypt: c^d (mod n) = t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two forms of ECC?

A

group addition—when there are 3 points of intersection
point doubling—when there are 2 points of intersection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In an ECC public key what does (P, T) stand for?

A

P in public key is the leftmost point or the first point of the intersection
T is some random point or an agreed-upon point on the curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an ECC private key, what does (d) stand for?

A

(d) is the number of group additions or point doubling to get back to T
( reflected across the x-axis until you reach T)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is ECC popular?

A

ECC is popular because it can reach the same (or higher) levels of security as RSA, but uses much shorter key lengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two forms of VPNs?

A

site-to-site and remote-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Of the 6 VPN protocol families, which are the most widely
used?

A

MPLS, IPsec, and SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MPLS doesn’t do what by itself?

A

MPLS does not encrypt traffic by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which VPNs are the most secure?

A

IPsec and SSL/TLS

21
Q

IPsec uses 3 families of protocols: IKE, AH, ESP. What is each one responsible for?

A

IKE (Internet Key Exchange) – tunneling protocol used to establish the connection between sites. Establishing the tunnel is broken into 2 phases, discussed later. Uses UDP port 500.

AH (Authentication Header) Protocol – used to authenticate the sender and verify data integrity; no encryption. Establishes what is known as “transport mode.”

ESP (Encapsulating Security Payload) – responsible for encrypting data. Establishes “tunnel mode.”

22
Q

What does IPsec Phase 1 create?

A

a security association between the endpoints.

23
Q

IPsec Phase 2 creates what?

A

the tunnel client data passes through.

24
Q

What does AH provide?

A

AH only provides authentication, not encryption

25
Q

What does ESP provide?

A

ESP can provide both authentication & encryption

26
Q

What are the advantages of SSL/TLS over IPsec?

A

Always secure (no AH only)

Ubiquity (port 443 is a commonly used port)

Cheap

Easily traverses firewalls and NATs (IPsec has trouble here)

27
Q

Know the four phases of IAM (short answer)

A

Four Phases:
1. Registration and Identity Validation
2. Privileges Provisioning
3. Access Review
4. Access Revocation

28
Q

Know the 3 things a security policy should address in terms of password security

A

The policy should address:
* Strength – password length and complexity
* Age – how long between forcing password reset
* Reusability – how many reset cycles due to age are allowed before an already used password can be reused.

29
Q

Know the best way to offset weak passwords?

A

One of the best ways to offset weak passwords is by using MFA
(multi-factor authentication)… entering a password triggers a text,
phone call, etc with an additional pin number.

30
Q

What is SSO?

A

single sign-on; sign on once and receive access to all permitted resources

31
Q

What is Kerberos?

A

a SSO protocol used in Active Directory

32
Q

Define Federated SSO.

A

establishes a trust relationship between two different organizations’
networks

33
Q

What is SAML?

A

Security Assertion Markup Language
(SAML) – widely used standard for federated SSO.

SAML is XML-based; it is a framework for securely exchanging “assertions.”

34
Q

In SAML, what are SP and IdP?

A

Service provider (SP) – an entity that provides the requested service to the principal.

Identity provider (IdP) – authentication authority

EX: SP is blackboard & IdP authenticates you

35
Q

What is SIEM?

A

SIEM systems – Security Information and Event Management software.

36
Q

What is a baseline configuration?

A

a set of attributes related to a system that has been reviewed and tested. Can only be altered through a formal change process

37
Q

What are the 3 phases of vulnerability management? (short answer)

A

3 Phases of vulnerability management:
1. Identification
2. Analysis and Prioritization
3. Remediation

38
Q

What should IR SOPs (standard operating procedures) include?

A

The SOPs should include specific technical processes, techniques, checklists.

39
Q

What are the 4 phases of IR process?

A

Phase 1 – Preparation
Phase 2 – Detection and Analysis
Phase 3 – Contain, Eradicate, Recover
Phase 4 – Post-Incident Activity (Postmortem)

40
Q

Detection/Analysis and Containment/Eradication phases are often what?

A

loops

41
Q

Which phase is intended to improve the IR response in the future?

A

the Postmortem phase is intended to improve the IR response in the future

42
Q

What are the parts of the 5-Tuple?

A

The 5-Tuple – common industry term for the minimum event artifacts
that should be recorded:

  1. Source IP address
  2. Destination IP address
  3. Source port
  4. Destination port
  5. Protocol

(Note that all 5 are found in packet headers)

43
Q

What is attribution?

A

Attribution is the process of analyzing forensic data and building
timelines to attribute the act to a specific individual or party.

44
Q

What are the 3 types of digital evidence?

A
  1. best (physical copy/disk)
  2. corroborating
  3. indirect/circumstantial
45
Q

What’s the difference between a physical copy and a logical copy?

A

A physical copy of digital evidence is usually a bit-for-bit duplicate (image) of the entire original storage medium, even free space is copied exactly.

A logical copy is a duplicate of the data; metadata is often altered during the copy process.

46
Q

.aff, .dd, .vmdk, and .vdi, what are these files and what are they used for?

A

common image/virtual image file types used in forensics

47
Q

What is chain of custody?

A

Chain of custody is the formal process of documenting all procedures
performed on the evidence and how the evidence was handled.

(Chain of custody must be followed from the beginning of
investigation all the way to the day the evidence is presented in
court.)

48
Q

What are the 6 things that should always be documented for a chain of custody? (short answer)

A

how it was collected
when it was collected
how it was transported
how it was tracked
how it was stored
who had access to it

49
Q

What is the Windows Registry and how do you access it?

A

command line: ps -aux
(can also use top & htop instead of ps)