Mod A Flashcards
Also known as encapsulation, a characteristic of object-oriented programming (OOP) and used to isolate objects and subjects from each other
data hiding
Processors typically support 2 states:
supervisor aka kernel mode
problem aka user mode
In ____ state, the processor is operating at the highest privileges which means running process has access to all info on that system
supervisor
In ____ state, the processor can access info that is has been granted the privileges to access
problem
The process of logically segregating functions of hardware and software so that changes in the processes do not affect the other layers.
layering
In a brute force attack, the attacker has access to only the ______ text
cipher
In a known plaintext attack, the attacker has access to _____ text
both plain and cipher text
A type of known plain text attack in which multiple sets of plaintext and corresponding ciphertext can be analyzed for patterns or trends which can help extract the key
Linear cryptanalysis
A legal liability concept that requires an organization review its practices to ensure that protection requirements are met.
due diligence
Practicing due diligence can help create a defense against _____
negligence
A legal liability concept that defines the minimum level of info protection that a business must achieve
due care
The process of measuring business practices against the judgement of any reasonable individual is also known as the ______ rule
prudent man
This law was created in 1974 to govern the way federal agencies use and distribute personal information of U.S. citizens. It states that agencies cannot disseminate personal info without the permission of the individual. U.S. census and labor statistics are exempt.
U.S. Privacy Act of 1974
Created to provide a framework for how info traverses international borders. This guideline contains the following principles:
collection limitation
data quality
purpose specification
use limitation
security safeguards
openness principle
individual participation
accountability
OECD Guidelines
A link-state routing protocol that learns the entire network topology for the area using cost
OSPF
A distance-vector routing protocol that is only aware of directly connected neighbor routers and uses hop count as a metric
RIP
____ routing protocols send updates only when the network topology changes.
link-state
____ routing protocol sends entire content of the routing table to all neighbor routers every 30 seconds by default whether or not a topology change occurs
RIP
Data stored in a cloud is considered data at ___ and is not considered in transit until accessed over the internet
rest
Data stored in a SAN is considered data at ____-
rest
DNS servers use a ______ to store information about how to resolve IP addresses to domain names
hierarchical database
A ___ file is a flat file database that stores domain name resolution info locally. When DNS is unavailable, the computer might be able to resolve IP addresses of domain names by looking up info stored on this file.
hosts
A ____ database can be accessed, read, and written to by using code written in OOP language
Object-oriented
This database created relationship between records in tables by using primary keys.
relational
An open standard defined in Request for Comments (RF) 6749 that provides third-party application delegated access to resources without providing the owners credentials to the application
OAuth 2.0
An open standard developed by OASIS used to exchange authentication and authorization info. It is used to provide a standard way of encoding info so that info can be read and processed by multiple independent systems
SAML (extensible markup language (XML))
A XML based open standard developed by OASIS used for SSO. It is based on DSML (directory services markup lanaguage) that can be used to present LDAP info in XML format.
SPML (security provisioning markup language)
A XML based open standard developed by OASIS and is used to define access control policies. Most commonly used for attribute or role based policies and used in combination with SDN (software defined networking) systems
XACML
Port numbers from ___ to ___ are registered ports and are assigned by IANA. Also called user ports.
1024 - 49151
Port numbers from ___ to ___ are system ports and are assigned by IANA. Also called well known ports.
0 - 1023
Using antivirus software is a _____ access control
corrective
directive
preventive
detective
corrective
(ex: antivirus can take corrective action to repair damage caused by a computer virus)
A security standard based on British Standard 7799 (BS 7799) focused on security governance
ISO 27001
This standard use to be ISO 17799 and is based on British Standard 7799 (BS 7799). It defines security objectives and provide a list of security controls based on industry best practices
ISO 27002
An IT management framework created by the Information Systems Audit Control Association (ISACA) and IT Governance Institute (ITGI). It is used by security architects to provide an example of minimum security requirements of any organization.
COBIT (Control objects for information and related technology)
RTO + WRT = ?
MTD (max tolerable downtime)
The amount of time a business can survive without a particular service
RTO (recovery time objective)
A hardware rating that indicates how long a system should run before failing, on average.
MTBF (mean time between failures)
Indicates the amount of time it will take to recover a failed device or system
MTTR (mean time to repair)
AH is typically used wtih ESP in ___ mode
transport
(because IP headers are encrypted in tunnel mode)
ESP provides _____ for IPSec VPN tunnels
confidentiality
AH provides ____ and ___ for IPSec VPN tunnels
authentication and integrity
In ____ mode, ESP encrypts the entire packet including the IP headers and data. AH uses the IP headers to authenticate packets.
tunnel
In ___ mode, ESP encrypts only the packet data, leaving the IP headers unencrypted
transport
When AH and ESP are used together, ______ must establish separate SAs (4 total) for each protocol.
Internet Security Association and Key Management Protocol (ISAKMP)
A ___ creates a separate collision domain for each port on it.
switch
Groupings of subject and objects that have the same security requirements are called
security domains
Ring 0 of CPU ring model
Kernel
Ring 1 of CPU ring model
OS components that are not the kernel
Ring 2 of CPU ring model
Device drivers
Ring 3 of CPU ring model
Users
Process of hiding the operational complexity of a system from a system’s user
Abstraction
What are the 5 rules of evidence?
Be authentic
Be accurate
Be complete
Be convincing
Be admissable
An open standard method for decentralized authentication that is maintained by Open ID Foundation but uses RFC 6749 as a framework. It uses JSON Web Tokens (JWTs) and operates as a REST web service
OpenID Connect
Standard defined by RFC 5849
OAuth 1.0
A ____ is designed to prevent theft of computer equipment and is typically bolted to the wall, floor, or large immobile surface
lockdown enclosure