Final Exam Flashcards

1
Q

These enforce a series of rules defining
what kind of network traffic is allowed and
what is not allowed

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of verifying the identity of a particular person

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between a threat and an attack

A

Threat is a potential and does not need to have occured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three goals of security

A

Prevention, Detection, Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why anti-virus is not perfect

A

1) Zero-day attacks, 2) based on signatures for KNOWN malware (lots of variants)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Occurs when a malicious user utilizes a vulnerable web app to send malicious code to a different end user

A

XSS

cross-site scripting, a type of injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This part of the operating system creates and manages files and directories

A

File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standard of proof in a criminal case vs a civil case

A

Criminal: beyond a reasonable doubt
Civil: preponderance of the evidence (AKA more likely than not)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 4 ways malware can get onto a system

A

flashdrives, spam email, emails from infected friends/contacts, malicious websites, infected websites, infected computers on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

password are stored on a system as these, which vary based on a operating system
Also, how does a system authenticate a user password attempt

A

Hashes
The system hashes the attempt and compares the calculated hash to the stored hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the California Security Breach Act and its importance

A

Requires organizations that maintain personal identifiable information to inform customers about data breaches
Important bc if you work in security industry, there are notification requirements and guidelines (state governed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Systems on a network that includes files and/or progams in use by multiple people on or outside a network

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sets of devices, software, and cables that enables the exchange of information

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe two network topologies

A

Bus - Every component is connected to a single line, with “taps” for each
component
Advantages: quick to deploy, cheap
■ Disadvantage: lots of collisions, unreliable, a break in the line causes
the network to fail, performance is directly related to number of
components and usage
■ Example: Cable internet

Ring - Every component has 2
connections – a left and a right
side
■ Basically a bus with a
connection back around to
the beginning
■ Disadvantages:
Performance is generally
poor, not scalable, break in
one connection causes
complete network failure

Star
● Each node is connected to a
central point
● Most common physical topology
(Ethernet)
● Advantages: fast, non-central
failure does not bring down the
network, scalable
● Disadvantages: used to be very
expensive, but not anymore,
single point of failure, lots of
cabling

Mesh
● Advantages: self-healing, failure
tolerant, potentially fast
● Disadvantages: no known route
traversal, difficult to control and
filter traffic
● Example: Wireless ad-hoc
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This device inspects the data of a packet to see if it is malicious in nature

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the first operating system & service pack to include a firewall enabled by default

A

Windows XP SP2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any program that is hidden within another

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is CIA and why is it important?

A

“Confidentiality
Only those with sufficient privileges and a demonstrated need may access certain information

Integrity
Quality or state of being whole, complete, or uncorrupted

Availability
Enables user to access information without interference or obstruction and in a useable format

Traits of well-implemented security”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens when there is not enough RAM for memory

A

Virtual memory - aka pagefile or swapfile

Paging allows for memory to be “swapped” out to the hard disk when there is not enough RAM to hold everything attempting to be stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Inserting code into a web app when it should be processing data

A

Code injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This model is a set of guidelines used to standardize network processes
What are the layers

A

OSI or TCP/IP

7) Application
6) Presentation
5) Session
4) Transport
3) Network
2) Data Link
1) Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Examples of layer 6 of the OSI model, presentation

A

.doc, .jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Smallest unit of processing that can be scheduled

A

Thread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The act of luring a victim to divulge his/her personal or financial info

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An executable set of code

A

Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This command is used to test the reachability of a host and measure round-trip time for messages sent from a host to a destination machine

A

Ping

27
Q

Explain the three way handshake

A

Hi, I’m here. Are you there.
SYN

Yes, I see you’re there, I’m here and listening.
SYN,ACK

Great! Got your response. Ready to start sending.
ACK

28
Q

Purpose of PAR

A

Positive acknowledgement and retransmission
Allows receiver to reassemble message and for
sender to know which packets may have gotten
dropped after the 3-way handshake

29
Q

What type of user account has complete power over a system?

A

Super user

30
Q

This part of any computer system is responsible for managing hardware and software resources

A

Operating System

31
Q

Self-replicating computer programs

A

Computer viruses/worm

32
Q

What does the TCP sliding window do

A

Indicates how many segments can be sent before ACK - smaller when the computer is busier and bigger when the computer is idle

33
Q

What are the 3 pieces of hardware where data resides on a computer and how long do each store it? Order of speed?

A

CPU - fastest - only holds data for immediate use

RAM - fast - holds data for currently running processes

Hard drive - slowest - holds data for permanent storage

34
Q

Difference between dynamic and static IP addresses

A

Dynamics is assigned via DHCP server/router on the network automatically as hosts connect

Static are assigned by a person to a network interface/system

35
Q

What are ports?

A

Like PO boxes - allows the network to direct traffic at a specific program or service

36
Q

A single system in a network that connects to the internet

A

Gateway

37
Q

Four layers of the TCP/IP model

A

Network, internet, transport, application

38
Q

Difference between public and private IP addresses and purpose of each

A

Public - purchased from an ISP and paid for - how you connect to the rest of the internet

Private - created by your router within your home network in order to share one public IP address amongst many devices

39
Q

What type of encryption uses the same key for encryption and decryption

A

Symmetric, DES, AES

40
Q

The first version of Windows designed from a security standpoint and what went wrong

A

Vista; too much security impacted usability

41
Q

Name and describe 4 types of malware

A

Spyware - malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent

Ransomeware - encrypts files on a device, rendering any files and the systems that rely on them unusable until a ransom is paid

Keylogger - records keystrokes

Backdoor - attack bypassing existing security systems to gain unauthorized access

42
Q

Phishing attack aimed at specific individuals or companies

A

Spearphishing

43
Q

According to OWASP, this type of web attack is the most common security risk to web apps

A

Code injection

44
Q

Difference between stored and reflected cross site scripting

A

Stored - code is injected and permanently on target servers (databases), victim retrieves malicious script when they request the stored info

Reflected - injected code reflected off of web server. response includes some or all of input sent to server as part of the request. Delivered to user via email message/other web server, user is tricked into clicking on malicious link

45
Q

The science of manipulating human beings to divulge confidential info or take a certain action

A

Social engineering

46
Q

Difference btwn top down and bottom up info processing

A

Top down - knowledge driven, based on prev exp, goals/expectations drive perception

Bottom up - used when knowledge is lacking, recognition by components, info driven

47
Q

Four steps of a social engineering attack

A

Research, hook, play, exit

48
Q

4 basic human tendencies

A

Reciprocity, social proof, consistency, scarcity, liking, authority

49
Q

Lollipop vs onion model

A

Lollipop - perimeter, hard crunchy shell on outside, soft chewy center inside, valuables exposed once perimeter breached

onion - layered security architecture

50
Q

used to control intercommunication btwn lvls of trust

A

Access Control Lists (ACLs)

51
Q

4 main components of a secure network topology

A

Perimeter firewall (btwn internet and organization)

Perimeter network (DMZ - area btwn perimeter firewall and internal firewall)

Internal firewall (limits all access to internal network)

Internal Network (location of rest of info assets)

52
Q

6 basic ways to defend your system (personal and enterprise)

A
  • remove unnecessary hardware
  • rename admin account and change password
  • remove unused user accounts
  • use antivirus and keep it up to date
  • use software/hardware firewalls
  • use encryption
  • perform backups
  • enforce password policies
  • content filter
  • app whitelisting
  • restrict BYOD
53
Q

Type of software designed to detect and prevent unauthorized attempts to copy/send sensitive data, intentionally or unintentionally, even if the person is authorized to access the info

A

Data loss prevention software

54
Q

Using court approved methods to acquire, investigate, and present evidence which allows decision makers to act on knowledge

A

Digital forensics

55
Q

Difference btwn 3 types of investigations

A

Internal - internal to org (e.g. employee processes unauthorized documents)

Civil - 2 parties in a civil suit (e.g. employee sues for wrongful termination)

Criminal - criminal lawsuit (e.g. CP)

56
Q

2 golden rules of forensics

A

1 - protect and preserve evidence
2 - always assume case will go to court

57
Q

Examples of what are considered “original evidence media”

A

Hard disk, CD rom, SSD, cell phone, tablet, USB flash drive, portable hard drive, email accounts, server

58
Q

Items required for court admissibility of a hard drive

A

Bitstream copy (forensic image) of drive

Imaging log record cryptographic hashes of source drive and image file

Chain of custody document

59
Q

What is Info Sec Management

A

Activities relating to protection of info/info assets against risk of loss, misuse, disclosure, or damage and describes controls that org needs to implement to ensure risks are managed

60
Q

Benefits of risk assessments

A

Proactive rather than reactive
Help identify vulnerabilities
Help identify threats
Will provide info to form cohesive strategy

61
Q

2 procedures used for contingency planning

A

Incident response - procedure for when infosec incident occurs

Disaster recovery - procedure for when natural/manmade disaster occurs

62
Q

3 things needed to adequately secure a system, and the weakest link

A

People (weakest link), process, technology

63
Q

Characteristics of common law legal systems

A
  • uncodified
  • everything based on precedent
  • contest btwn 2 opposing parties before a judge who moderates
  • divided into criminal, civil, and administrative codes
  • everyone innocent until proven guilty
64
Q

3 roles of computers in a lawsuit

A

computer assisted crime
computer targeted crime
computer was incidental