Misc Flashcards
Which RFC defines the Internet Protocol?
RFC 791
This document is considered step by step and can be tied closely to hardware.
Procedure
DES does how many rounds during the encryption process?
16
What form of testing is there very little or no knowledge of the target network?
Black Box
What is Presence?
Remote access program for Apple computers.
An Nmap full connect scan uses which switch?
nmap -sT
Which risk assessment method is similar to the structured review yet individuals present for the meeting must write their responses down and hand them to the team lead for review?
Modified Delphi
DES has an effective key length of?
56
Which RFC defines the IETF?
RFC 1700
Extended ACLs cannot by default examine which of these?
- Protocol
- IPSEC data
- DSCP
- Precedent Value
IPSEC Data
An ICMP type 8 message is best defined as?
Echo Request (Ping)
Which RFC defines ICMP?
RFC 792
How many steps of the TCP startup are completed in a stealth scan?
Two
SLE Formula?
Single Loss Expectancy
AV (asset value) * EF (exposure factor)
Which Nmap switch is used to identify the version of OS running?
nmap -O
SAFER uses how many blocks of data?
64
Which encryption algorithm can be used for data at rest and is based on the Rijndael algorithm?
AES
These are considered tactical documents, as they lay out specific steps or processes required to meet a certain requirement.
Standards
After completing a port scan you have identified TCP port 80 as open. What should be your next step?
Banner Grab
What is jitter?
The variations in transmission latency that can cause packet loss and degraded VoIP call quality.
What is ICMP type 3 code 13?
Unreachable Message
ALE Formula?
Annualized Loss Expectancy
SLE * ARO
Single Loss Expectancy * Annualized Rate of Occurence
What is another name for the software vulnerability version model?
Plan, Secure, Confirm, Remediate
SNORT cannot filter what traffic types?
OSPF
An IPV4 header has a default length of?
20 bytes
Clustering is an example of what control?
Compensating Control
What is the specification for an information security management system (ISMS)?
An ISMS is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization’s information risk management process.
Includes best practices for information security management.
ISO 27001
3DES does how many rounds during the encryption process?
48