General Security Flashcards
4 Phases of DITSCAP and NIACAP accreditation
- Definition”
A weakness in a system which might be exploited
Vulnerability
ALE
Annualized Loss Expectancy
Also called a maintenance hook
Trap door
An event that can cause harm to a system and create a loss of C, I , A
Threat
Are SSL and TLS compatible?
no
Are SSL sessions stateful or stateless?
stateful
ARO
Annualized Rate of Occurence
At the Network Interface layer, what is the packet of information placed on the wire known as?
a frame
At what OSI layer (and above) must networked computers share a common protocol?
data link and above
Attack that exploits difference in time when a security control is applied and a service is used
TOC/TOU attack
Biba, Clark Wilson, and Non?Interference models cover what aspect of security
Integrity
Combination of ITSEC, TCSEC, and Canada’s CTCPEC
Common Criteria
Consolidation of power should not be allowed in a secure system, this is called
Separation (or segregation) of duties
Design where a component failure allows the system to continue to function
Fault?tolerant
Design where a failure causes non?critical processes to terminate, and system runs in a degraded state
Fail?soft or Resilient
Design where a failure causes termination of processes to protect the system from compromise
Fail?safe
Design where a failure causes the system to use backup spare components to compensate for failed ones
Fail?over
Do hashing algorithms protect files from unauthorized viewing?
no, only verify files have not been changed
Does DSS use symmetric or asymmetric keys?
asymmetric
Does L2TP require IP connectivity?
no
Does PPTP require IP connectivity?
yes
Does TLS use the same ports for encrypted and unencrypted data?
no
EF
Exposure Factor
European counterpart to TCSEC
ITSEC (Information Technology Security Evaluation Criteria)
Execution and memory space assigned to each process is called a _______ _______
Protection Domain
From what does RSA derive its strength?
the difficulty of factoring large numbers
How are asymmetric algorithms used for authentication?
authenticator sends a random number (nonce) to receiver, who encrypts it with their private key
How are digital signatures implemented?
a hash is created and encrypted with the creator’s private key
How are RSA and DES used together?
RSA is used to encrypt the key for transmission; DES is used for message encryption
How can source routing be defended against?
routers can be configured to discard source?routed packets
How do the RADIUS client and server avoid sending their shared secret across the network?
shared secret is hashed and hash is sent
How does a host respond to a FIN packet if the scanned port is open? Closed?
open: packet discarded; closed: RST
How does a host respond to a TCP connect scann if the scanned port is open? Closed?
open: SYN?ACK; closed: RST
How does an 802.1x authenticator handle authentication traffic?
Passes it to a RADIUS server for authentication
How does an application?level firewall handle different protocols?
with a proxy program for each protocol
How does an XMAS scan work?
a variety of TCP packets are sent to elicit a response
How does CHAP work?
server sends random value to client; client uses MD5 to create hash with ID, random value, and shared secret; client sends hash to server; server performs same function and compares values
How is source routing used by attackers?
used to route packets around security devices
In a 128?bit WEP key, how long is the actual secret key?
104 bits? the first 24 bits are used for the Initialization Vector (IV)
In a bridge CA architecture, what is the CA that connects to a bridge CA called?
a principal CA
In biometric scanning, what is the crossover rate?
error percentage when Type I and II errors are equal
In MAC, of read?up, read?down, write?up, and write?down, which two are legal? Which two are illegal?
legal? read?down, write?up”
In MAC, what is read?up?
the ability of users in lower security categories to read information in higher categories
In relation to AAA, what is CIA?
Confidentiality, Integrity, Availability
Is 802.11g backwards?compatible with 802.11a and 802.11b?
backwards?compatible with 802.11b only at 11 Mbps
Is L2TP usually implemented through hardware or software?
hardware
Is PPTP usually implemented through hardware or software?
software
Is RSA a public? or private?key system?
public?key
ITSEC separately evaluates ____ and _____
Functionality and Assurance
Lack of parameter checking leaves a system vulnerable to this type of attack
Buffer overflow
No Read Up, No Write Down describes what Security Model
Bell LaPadula
Non?repudiation has been compared to what real?world version of authentication?
using a public notary
Observing the timer value in the TCP stack makes what possible?
determining the OS in use, useful in planning attacks
Operates at the highest level of information classification where all users must have clearances for the highest level
System High mode
Operating system loaded without the front?end security enabled, is only done in this mode
Single?user mode
Operators are given varying assignments for a time period, then their assignment changes. This is called
Rotation of duties
Programming technique used to encapsulate methods and data in an object
Information Hiding
Required tracking of changes to a system under B2, B3, and A1 is called
Configuation Management
Separation of duties, least privilege, personnel security, configuration control, Record retention, are examples of what type of controls?
Administrative Controls
SLE
Single Loss Expectancy
Software controls, media controls, hardware controls, physical access controls are examples of what type of controls?
Operations Controls
System component that manages and enforces access controls on objects
Reference Monitor
TCSEC Discretionary Protection (two classes)
C1 (User logon, Groups allowed)”
TCSEC level that addresses both covert storage and timing channels
B3, A1
TCSEC Level that addresses covert storage channels
B2
TCSEC Mandatory Protection (three classes)
B1 (MAC)”
TCSEC Minimal Protection (one class)
D (Minimal Protection)
TCSEC Verified Protection (one class)
A1 (Mathematical model must be proven)
The Boundary that separates the TCB from the rest of the system.
Security Perimeter
The ITSEC subject of an evaluation is called the ___ __ _____
Target of Evaluation (TOE)
This Access Control model specifies the rights that a subject can transfer to an object, or that a subject can take from another subject.
Take?Grant model
This recovery mode permits access by only privileged users from privileged terminals
Maintenance mode
This refers to the data left on media after erasure
Data Remanence
This standard includes levels of assurance, from D (Least secure) to A (Most secure)
TCSEC (Trusted Computer Security Evaluation Criteria)
This type of recovery is required for only B3 and A1 TCSEC levels
Trusted Recovery
Two operators are needed to perform a function. This is called
Dual Control
Two operators review and approve each other’s work. This is called
Two?man control
Unit of evaluations levels in the Common Criteria
Evaluation Assurance Level”
What advantage does compulsory tunneling provide?
allows VPN connections to be concentrated over fewer high?capacity lines
What advantage does LEAP have over EAP?
LEAP allows for mutual authentication
What advantage does LEAP have over EAP?
LEAP allows for mutual authentication
What advantage does RADIUS have over TACACS+?
better vendor support and implementation
What advantage does TACACS+ have over RADIUS?
better security
What advantage does TACACS+ have over TACACS?
multi?factor authentication
What advantages do hand geometry scans have over fingerprint scans?
they are faster, cleaner, and less invasive
What algorithm does AES use?
Rijndael
What are DAT drives primarily used for?
basic network backups
What are most fire extinguishers loaded with?
FE?36
What are QIC tapes primarily used for?
backing up standalone computers
What are the advantages and disadvantages of retinal scanning?
most reliable but most invasive
What are the five main services provided by firewalls?
packet filtering; application filtering; proxy server; circuit?level; stateful inspection
What are the four layers of the TCP/IP suite? How do they map to the OSI model?
Application > Application?Session”
What are the four WAP layers?
Wireless Application Environment (WAE); Wireless Session Layer (WSL); Wireless Transport Layer Security (WTLS); Wireless Transport Layer (WTL)
What are the seven stages in a certificate life cycle?
certificate enrollment; distribution; validation; revocation; renewal; destruction; auditing
What are the six steps to incident response?
Preparation; Identification; Containment; Eradication; Recovery; Follow?Up
What are the three A’s in computer forensics?
Acquire, Authenticate, Analyze
What are the three components of AAA?
Authentication, Authorization, Access Control
What are the three major classification levels with MAC?
Top Secret; Confidential; Unclassified
What are the three major components of SSH?
Transport Layer protocol (SSH?TRANS); User authentication protocol (SSH?USERAUTH); connection protocol (SSH?CONN)
What are the three types of NAT?
static NAT; dynamic NAT; overloading NAT
What are the two advantages of block ciphers over stream ciphers?
they are faster and more secure
What are the two basic types of DoS attacks?
flaw exploitation attacks and flooding attacks
What are the two encryption modes for IPSec?
Transport, where only the data is encrypted; and Tunneling, where the entire packet is encrypted
What are the two main components of L2TP?
L2TP Access Controller (LAC) and L2TP Network Server (LNS)
What are the two main types of firewalls?
application?level and network?level
What are the two most popular hashing routines in use today?
MD5 and SHA?1
What are the two parts of a Key Distribution Center?
An authentication server (AS) and a ticket?granting server (TGS)
What are the two types of network?level firewalls?
packet filters and stateful packet inspection
What are the two types of symmetric algorithms?
block and stream
What are tokens also known as?
One?time passwords
What are two characteristics of a null scan?
TCP sequence number set to 0; no TCP flags set
What can be done to reduce the effects of half?open attacks?
reduce the time a port waits for a response
What disadvantage does CRL have that OCSP addresses?
updates must be downloaded frequently to be accurate
What disadvantage does CRL have the OCSP addresses?
updates must be downloaded frequently to be accurate
What disadvantage does speech recognition have?
easier to spoof than other biometric techniques
What do BSS and ESS stand for?
Basic Service Set and Extended Service Set
What DoD classification does DAC map to?
Level?C classification