Practice Exams Flashcards

1
Q
Lower Layers (Physical, Link, Network, Transport) protection tools are unable to protect against what kind of attacks?
 Piggy Back Attacks 
Brute Force Attacks 
Denial of Service Attacks 
Content Based Attacks
A

Content Based Attacks

Lower Layer Protocols do not interact with data contained in the payload. Because Lower Layer Protocols do not interact with data contained in the payload, they are unable to detect content based attacks, since the content per definition is in the payload.

Similarly they cannot detect Denial of Service attacks in the higher layers (application level DoS), however in general they ARE able to detect DoS attacks, just not ALL DoS attacks.

Brute force attacks on password could be at the application layer and could not be detected by lower levels tools as well. However, the more generic and high level term Content Based attacks would include brute force attacks and it is a the BEST choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ISO/IEC 27001:2013 is a standard for:

A

Information Security Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a telecommunication device that translates data from digital to analog form and back to digital?

Multiplexer
Modem
Protocol converter
Concentrator

A

Modem

A modem is a device that translates data from digital form and then back to digital for communication over analog lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following should NOT be a role of the Security Administrator?

Authorizing access rights
Implementing security rules
Ensuring that local policies have been authorized by management
Allocating access rights

A

Authorizing access rights

The NOT keyword is used in the question. You need to find out the role which is NOT performed Security Administrator.
For proper segregation of duties, the security administrator should not be responsible for authorizing access rights. This is usually the responsibility of user management/data owner.

For your exam you should know the information below:

End User - The end user is responsible for protecting information assets on a daily basis through adherence to the security policies that have been communicated.
Executive Management/Senior Management - Executive management maintains the overall responsibility for protection of the information assets. The business operations are dependent upon information being available, accurate, and protected from individuals without a need to know.

Security Officer - The security officer directs, coordinates, plans, and organizes information security activities throughout the organization. The security officer works with many different individuals, such as executive management, management of the business units, technical staff, business partners, auditors, and third parties such as vendors. The security officer and his or her team are responsible for the design, implementation, management, and review of the organization‚„¢s security policies, standards, procedures, baselines, and guidelines.
Information Systems Security Professional- Drafting of security policies, standards and supporting guidelines, procedures, and baselines is coordinated through these individuals. Guidance is provided for technical security issues, and emerging threats are considered for the adoption of new policies. Activities such as interpretation of government regulations and industry trends and analysis of vendor solutions to include in the security architecture that advances the security of the organization are performed in this role.

Data/Information/Business/System Owners - A business executive or manager is typically responsible for an information asset. These are the individuals that assign the appropriate classification to information assets. They ensure that the business information is protected with appropriate controls. Periodically, the information asset owners need to review the classification and access rights associated with information assets. The owners, or their delegates, may be required to approve access to the information. Owners also need to determine the criticality, sensitivity, retention, backups, and safeguards for the information. Owners or their delegates are responsible for understanding the risks that exist with regards to the information that they control.

Data/Information Custodian/Steward - A data custodian is an individual or function that takes care of the information on behalf of the owner. These individuals ensure that the information is available to the end users and is backed up to enable recovery in the event of data loss or corruption. Information may be stored in files, databases, or systems whose technical infrastructure must be managed, by systems administrators. This group administers access rights to the information assets.

Information Systems Auditor- IT auditors determine whether users, owners, custodians, systems, and networks are in compliance with the security policies, procedures, standards, baselines, designs, architectures, management direction, and other requirements placed on systems. The auditors provide independent assurance to the management on the appropriateness of the security controls. The auditor examines the information systems and determines whether they are designed, configured, implemented, operated, and managed in a way ensuring that the organizational objectives are being achieved. The auditors provide top company management with an independent view of the controls and their effectiveness.

Business Continuity Planner - Business continuity planners develop contingency plans to prepare for any occurrence that could have the ability to impact the company‚„¢s objectives negatively. Threats may include earthquakes, tornadoes, hurricanes, blackouts, changes in the economic/political climate, terrorist activities, fire, or other major actions potentially causing significant harm. The business continuity planner ensures that business processes can continue through the disaster and coordinates those activities with the business areas and information technology personnel responsible for disaster recovery.

Information Systems/ Technology Professionals- These personnel are responsible for designing security controls into information systems, testing the controls, and implementing the systems in production environments through agreed upon operating policies and procedures. The information systems professionals work with the business owners and the security professionals to ensure that the designed solution provides security controls commensurate with the acceptable criticality, sensitivity, and availability requirements of the application.

Security Administrator - A security administrator manages the user access request process and ensures that privileges are provided to those individuals who have been authorized for access by application/system/data owners. This individual has elevated privileges and creates and deletes accounts and access permissions. The security administrator also terminates access privileges when individuals leave their jobs or transfer between company divisions. The security administrator maintains records of access request approvals and produces reports of access rights for the auditor during testing in an access controls audit to demonstrate compliance with the policies.

Network/Systems Administrator - A systems administrator (sysadmin/netadmin) configures network and server hardware and the operating systems to ensure that the information can be available and accessible. The administrator maintains the computing infrastructure using tools and utilities such as patch management and software distribution mechanisms to install updates and test patches on organization computers. The administrator tests and implements system upgrades to ensure the continued reliability of the servers and network devices. The administrator provides vulnerability management through either commercial off the shelf (COTS) and/or non-COTS solutions to test the computing environment and mitigate vulnerabilities appropriately.

Physical Security - The individuals assigned to the physical security role establish relationships with external law enforcement, such as the local police agencies, state police, or the Federal Bureau of Investigation (FBI) to assist in investigations. Physical security personnel manage the installation, maintenance, and ongoing operation of the closed circuit television (CCTV) surveillance systems, burglar alarm systems, and card reader access control systems. Guards are placed where necessary as a deterrent to unauthorized access and to provide safety for the company employees. Physical security personnel interface with systems security, human resources, facilities, and legal and business areas to ensure that the practices are integrated.

Security Analyst - The security analyst role works at a higher, more strategic level than the previously described roles and helps develop policies, standards, and guidelines, as well as set various baselines. Whereas the previous roles are ‚“in the weeds‚ and focus on pieces and parts of the security program, a security analyst helps define the security program elements and follows through to ensure the elements are being carried out and practiced properly. This person works more at a design level than at an implementation level.

Administrative Assistants/Secretaries - This role can be very important to information security; in many companies of smaller size, this may be the individual who greets visitors, signs packages in and out, recognizes individuals who desire to enter the offices, and serves as the phone screener for executives. These individuals may be subject to social engineering attacks, whereby the potential intruder attempts to solicit confidential information that may be used for a subsequent attack. Social engineers prey on the goodwill of the helpful individual to gain entry. A properly trained assistant will minimize the risk of divulging useful company information or of providing unauthorized entry.

Help Desk Administrator - As the name implies, the help desk is there to field questions from users that report system problems. Problems may include poor response time, potential virus infections, unauthorized access, inability to access system resources, or questions on the use of a program. The help desk is also often where the first indications of security issues and incidents will be seen. A help desk individual would contact the computer security incident response team (CIRT) when a situation meets the criteria developed by the team. The help desk resets passwords, resynchronizes/reinitializes tokens and smart cards, and resolves other problems with access control. These functions may alternatively be performed through self-service by the end user, e.g., an

Supervisor - The supervisor role, also called user manager, is ultimately responsible for all user activity and any assets created and owned by these users. For example, suppose Kathy is the supervisor of ten employees. Her responsibilities would include ensuring that these employees understand their responsibilities with respect to security; making sure the employees‚„¢ account information is up-to-date; and informing the security administrator when an employee is fired, suspended, or transferred. Any change that pertains to an employee‚„¢s role within the company usually affects what access rights they should and should not have, so the user manager must inform the security administrator of these changes immediately.

Change Control Analyst Since the only thing that is constant is change, someone must make sure changes happen securely. The change control analyst is responsible for approving or rejecting requests to make changes to the network, systems, or software. This role must make certain that the change will not introduce any vulnerabilities, that it has been properly tested, and that it is properly rolled out. The change control analyst needs to understand how various changes can affect security, interoperability, performance, and productivity. Or, a company can choose to just roll out the change and see what happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who should provide access authorization to computerized information?

Database administrator
Security administrator
Data owner
Network administrator

A

Data Owner

The data owner has the power to determine who can (and cannot) access that data based on the business requirements and constraints affecting that owner. While the owner never has the ability to ignore or contradict the organization‚„¢s access control policies, he or she has the ability to interpret those policies to fit the specific needs of his or her system and his or her users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the integrity goal addressed by the Biba Model?

Prevent interception of message content by unauthorized parties

Prevent data modification by unauthorized parties

Prevent unauthorized data modification by authorized parties

Maintain internal and external consistency

A

Prevent data modification by unauthorized parties

This is the only integrity goal addressed by the Biba Integrity model. Clark-Wilson addresses all three goals of integrity but the Biba model addresses only the first goal of integrity.

Below you have the description of the Clark-Wilson model which addresses all three goals of integrity:

Prevent data modification by unauthorized parties (Biba address only this one)
Prevent unauthorized data modification by authorized parties
Maintain internal and external consistency (i.e. data reflects the real world)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?

Known-plaintext attack
Ciphertext-only attack
Chosen-Ciphertext attack
Plaintext-only attack

A

Ciphertext-only attack

In a ciphertext-only attack, the attacker has the ciphertext of several messages encrypted with the same encryption algorithm. Its goal is to discover the plaintext of the messages by figuring out the key used in the encryption process.

In a known-plaintext attack, the attacker has the plaintext and the ciphertext of one or more messages.

In a chosen-ciphertext attack, the attacker can chose the ciphertext to be decrypted and has access to the resulting plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following techniques is used in the ENCRYPTION of Hypertext Transport Protocol (HTTP) data between a Web Browser and Web Server?

SSL
PGP
IPSec
Kerberos

A

SSL (Secure Sockets Layer)

The Secure Socket Layer (SSL) and also the Transport Layer Security (TLS) protocols are used for the encryption of Hypertext Transport Protocol (HTTP) data between a Web Browser and a Web Server.

SSL/TLS and The Internet Protocol Security (IPSec) protocol suite both provides a method of setting up a secure channel for protecting data exchange between two entities wishing to communicate securely with each other.

The biggest difference between IPSEC and SSL is:

Using IPSEC the encryption is done at the Network Layer of the OSI model. The IPSEC devices that share this secure channel can be two servers, two routers, a workstation and a server, or two gateways between different networks. It is always from a HOST to another HOST.

SSL/TLS is used for APPLICATION to APPLICATION secure channels. The question was making reference specifically to a Web Browser, being an Application this ruled out IPSEC as a valid choice.

For your exam you should know the information below about Secure Socket Layer (SSL) and Transport Layer Security (TLS)

These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.
SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.

SSL involves a number of basic phases
Peer negotiation for algorithm support
Public-key, encryption based key exchange and certificate based authentication
Symmetric cipher based traffic encryption.

SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.

SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.

The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiate the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.

The SSL protocol provides
Confidentiality
Integrity
Authentication, e.g. between client and server
Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following BEST provides e-mail message authenticity and confidentiality?

Signing the message using the sender’s public key and encrypting the message using the receiver’s private key

Signing the message using the sender’s private key and encrypting the message using the receiver’s public key

Signing the message using the receiver’s private key and encrypting the message using the sender’s public key

Signing the message using the receiver’s public key and encrypting the message using the sender’s private key

A

Signing the message using the sender’s private key and encrypting the message using the receiver’s public key

By encrypting the message with the receiver’s public key, only the receiver can decrypt the message using his/her own private key, only the receiver has a copy of the matching private key, thus ensuring confidentiality.

By signing the message encrypting the message digest using the sender private key, the receiver can verify its authenticity and integrity using the sender’s public key.

The receiver’s private key is confidential and must be protected by the receiver, therefore unknown to the sender.

Messages encrypted using the sender’s private key can be read by anyone (with the sender’s public key) to prove the authenticity only.

For your exam you should know the information below:

A digital signature is used to achieve integrity, authenticity and non-repudiation. In a digital signature the sender’s private key is used to encrypt a message digest of the message and receiver need to validate the same using sender’s public key.

A digital signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.

A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender’s identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.

How It Works

Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you.

  1. You copy-and-paste the contract (it’s a short one!) into an e-mail note.
  2. Using special software, you obtain a message hash (mathematical summary) of the contract.
  3. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash.
  4. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.)

At the other end, your lawyer receives the message.

  1. To make sure it’s intact and from you, your lawyer makes a hash of the received message.
  2. Your lawyer then uses your public key to decrypt the message hash or summary.
  3. If the hashes match, the received message is valid.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following organizations PRODUCES and PUBLISHES the Federal Information Processing Standards (FIPS)?

The National Computer Security Center (NCSC)

The National Institute of Standards and Technology (NIST)

The National Security Agency (NSA)

The American National Standards Institute (ANSI)

A

The National Institute of Standards and Technology (NIST)

FIPS publications are issued by NIST after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Reform Act of 1996, Public Law 104-106, and the FISMA Act of 2002.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT part of the Kerberos authentication protocol?

Symmetric key cryptography
Authentication Service (AS)
Principals
Public Key

A

Public Key

There is no such component within kerberos environment. Kerberos uses only symmetric encryption and does not make use of any public key component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A DMZ is also known as a

screened subnet
three legged firewall
a place to attract hackers
bastion host

A

screened subnet

This is another name for the demilitarized zone (DMZ) of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack involves IP spoofing, ICMP ECHO and a bounce site?

IP spoofing attack
Teardrop attack
SYN attack
Smurf attack

A

Smurf attack

A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). The modified packet containing the address of the target system, all devices on its local network respond with a ICMP REPLY to the target system, which is then saturated with those replies. An IP spoofing attack is used to convince a system that it is communication with a known entity that gives an intruder access. It involves modifying the source address of a packet for a trusted source’s address. A teardrop attack consists of modifying the length and fragmentation offset fields in sequential IP packets so the target system becomes confused and crashes after it receives contradictory instructions on how the fragments are offset on these packets. A SYN attack is when an attacker floods a system with connection requests but does not respond when the target system replies to those requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a LAN transmission method?

Broadcast
Carrier-sense multiple access with collision detection (CSMA/CD)
Token ring
Fiber Distributed Data Interface (FDDI)

A

Broadcast

LAN transmission methods refer to the way packets are sent on the network and are either unicast, multicast or broadcast.

CSMA/CD is a common LAN media access method.

Token ring is a LAN Topology.

LAN transmission protocols are the rules for communicating between computers on a LAN.

Common LAN transmission protocols are: polling and token-passing.

A LAN topology defines the manner in which the network devices are organized to facilitate communications.

Common LAN topologies are: bus, ring, star or meshed.

LAN transmission methods refer to the way packets are sent on the network and are either unicast, multicast or broadcast.

LAN media access methods control the use of a network (physical and data link layers). They can be Ethernet, ARCnet, Token ring and FDDI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following standards concerns digital certificates?

X.400
X.25
X.509
X.75

A

X.509

X.509 is used in digital certificates.
X.400 is used in e-mail as a message handling protocol. X.25 is a standard for the network and data link levels of a communication network
X.75 is a standard defining ways of connecting two X.25 networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.

Network Address Translation
Network Address Hijacking
Network Address Supernetting
Network Address Sniffing

A

Network Address Hijacking

Network address hijacking allows an attacker to reroute data traffic from a network device to a personal computer.

Also referred to as session hijacking, network address hijacking enables an attacker to capture and analyze the data addressed to a target system. This allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization.

Session hijacking involves assuming control of an existing connection after the user has successfully created an authenticated session. Session hijacking is the act of unauthorized insertion of packets into a data stream. It is normally based on sequence number attacks, where sequence numbers are either guessed or intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What can best be described as an abstract machine which must mediate all access to subjects to objects?

A security domain
The reference monitor
The security kernel
The security perimeter

A

The reference monitor

The reference monitor is an abstract machine which must mediate all access to subjects to objects, be protected from modification, be verifiable as correct, and is always invoked. The security kernel is the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept. The security perimeter includes the security kernel as well as other security-related system functions that are within the boundary of the trusted computing base. System elements that are outside of the security perimeter need not be trusted. A security domain is a domain of trust that shares a single security policy and single management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following steps should be one of the first step performed in a Business Impact Analysis (BIA)?

Identify all CRITICAL business units within the organization.
Evaluate the impact of disruptive events.
Estimate the Recovery Time Objectives (RTO).
Identify and Prioritize Critical Organization Functions

A

Identify and Prioritize Critical Organization Functions

One of the first steps of a BIA is to Identify and Prioritize Critical Organization Functions. All organizational functions and the technology that supports them need to be classified based on their recovery priority. Recovery time frames for organization operations are driven by the consequences of not performing the function. The consequences may be the result of organization lost during the down period; contractual commitments not met resulting in fines or lawsuits, lost goodwill with customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How long are IPv4 addresses?

32 bits long.
64 bits long.
128 bits long.
16 bits long.

A

32 bits long.

IPv4 addresses are currently 32 bits long.
IPv6 addresses are 128 bits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following protocols is designed to send individual messages securely?

Kerberos
Secure Electronic Transaction (SET).
Secure Sockets Layer (SSL).
Secure HTTP (S-HTTP).

A

Secure HTTP (S-HTTP).

An early standard for encrypting HTTP documents, Secure HTTP (S-HTTP) is designed to send individual messages securely. SSL is designed to establish a secure connection between two computers. SET was originated by VISA and MasterCard as an Internet credit card protocol using digital signatures. Kerberos is an authentication system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer of the OSI/ISO model handles physical addressing, network topology, line discipline, error notification, orderly delivery of frames, and optional flow control?

Physical
Data link
Network
Session

A

Data link

The Data Link layer provides data transport across a physical link. It handles physical addressing, network topology, line discipline, error notification, orderly delivery of frames, and optional flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Diffie-Hellman algorithm is used for:

Encryption
Digital signature
Key agreement
Non-repudiation

A

Key agreement

The Diffie-Hellman algorithm is used for Key agreement (key distribution) and cannot be used to encrypt and decrypt messages.

Note: key agreement, is different from key exchange, the functionality used by the other asymmetric algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When a possible intrusion into your organization’s information system has been detected, which of the following actions should be performed first?

Eliminate all means of intruder access.

Contain the intrusion.

Determine to what extent systems and data may be compromised.

Communicate with relevant parties.

A

Determine to what extent systems and data may be compromised

Think Triage!!! Don’t let the wording fool you.

Once an intrusion into your organization’s information system has been detected, the first action that needs to be performed is determining to what extent systems and data may be compromised (if they really are), and then take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following statements pertaining to disaster recovery planning is incorrect?

Every organization must have a disaster recovery plan

A disaster recovery plan contains actions to be taken before, during and after a disruptive event.

The major goal of disaster recovery planning is to provide an organized way to make decisions if a disruptive event occurs.

A disaster recovery plan should cover return from alternate facilities to primary facilities.

A

Every organization must have a disaster recovery plan

It is possible that an organization may not need a disaster recovery plan. An organization may not have any critical processing areas or system and they would be able to withstand lengthy interruptions.

Remember that DRP is related to systems needed to support your most critical business functions.

The DRP plan covers actions to be taken when a disaster occur but DRP PLANNING which is the keywork in the question would also include steps that happen before you use the plan such as development of the plan, training, drills, logistics, and a lot more.

To be effective, the plan would certainly cover before, during, and after the disaster actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following was developed as a mechanism to allow simple network terminals to load their operating system from a server over the LAN?

DHCP
BootP
DNS
ARP

A

BootP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the name of the third party authority that vouches for the binding between the data items in a digital certificate?

Registration authority
Certification authority
Issuing authority
Vouching authority

A

Certification Authority

A certification authority (CA) is a third party entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate. An issuing authority could be considered a correct answer, but not the best answer, since it is too generic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Whose role is it to assign classification level to information?

Security Administrator
User
Owner
Auditor

A

Owner.

The Data/Information Owner is ultimately responsible for the protection of the data. It is the Data/Information Owner that decides upon the classifications of that data they are responsible for.

The data owner decides upon the classification of the data he is responsible for and alters that classification if the business need arises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A business impact assessment is one element in business continuity planning. What are the three primary goals of a BIA?

A

Criticality prioritization, downtime estimation, and resource requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which ITU-T standard did Microsoft base the development of Active Directory on?

X.400
ISO/IEC 9594
X.500
LDAP

A

X.500 which is the first in a series of directory standards.

This question is like many that require factual knowledge that the X.500 is a series of standards that all pertain to directory’s. Please see table below.

Active Directory - is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.[1][2] Initially, Active Directory was only in charge of centralized domain management. Starting with Windows Server 2008, however, Active Directory became an umbrella title for a broad range of directory-based identity-related services. https://en.wikipedia.org/wiki/Active_Directory

Within a single organization, a centralized access control system is often used. For example, a directory service is a centralized database that includes information about subjects
and objects. Many directory services are based on the Lightweight Directory Access Protocol (LDAP). For example, the Microsoft Active Directory Domain Services is LDAP based.

X.500 - https://en.wikipedia.org/wiki/X.500 X.500 is a series of computer networking standards covering electronic directory services. The X.500 series was developed by ITU-T, formerly known as CCITT, and first approved in 1988.[1] The directory services were developed in order to support the requirements of X.400 electronic mail exchange and name lookup. ISO was a partner in developing the standards, incorporating them into the Open Systems Interconnection suite of protocols. ISO/IEC 9594 is the corresponding ISO identification

See X.500 series standards printout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the MOST important step in business continuity planning?

Risk Assessment
Due Care
Business Impact Analysis (BIA)
Due Diligence

A

Business Impact Analysis (BIA)

The BIA is the first step after the initiation of the project. It is one of the most important step. THis is where you identify and prioritize your information systems and components critical to supporting the organization’s mission/business processes.

  1. Step one is Initiation of the project where management would be involved and a business continuity policy would be put in place.
  2. You then conduct the business impact analysis (BIA). The BIA helps identify and prioritize information systems and components critical to supporting the organization’s mission/business processes.
  3. Identify preventive controls. Measures taken to reduce the effects of system disruptions can increase system availability and reduce contingency life cycle costs.
  4. Create contingency strategies. Thorough recovery strategies ensure that the system may be recovered quickly and effectively following a disruption.
  5. Develop an information system contingency plan. The contingency plan should contain detailed guidance and procedures for restoring a damaged system unique to the system’s security mpact level and recovery requirements.
  6. Ensure plan testing, training, and exercises. Testing validates recovery capabilities, whereas training prepares recovery personnel for plan activation and exercising the plan identifies planning gaps; combined, the activities improve plan effectiveness and overall organization preparedness.
  7. Ensure plan maintenance. The plan should be a living document that is updated regularly to remain current with system enhancements and organizational changes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following authentication protocol encrypts only the password in the access-request packet, from the client to the server versus the whole body of the packet?

XTACACS
TACACS
RADIUS
TACACS+

A

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a mechanism that allows authentication of remote and other network connections. Once intended for use on dial-up connections, it has moved far beyond that and has many modern features. It is used on both wired and wireless networks.

The RADIUS protocol is an IETF standard, and it has been implemented by most of the major operating system manufacturers. A RADIUS server can be managed centrally, and the servers that allow access to a network can verify with a RADIUS server whether an incoming caller is authorized. In a large network with many connections, this allows a single server to perform all authentications.

The communication is encrypted using a fix key between the RADIUS Client and the RADIUS Server. However, the information is NOT encrypted between the Supplicant and the RADIUS Client.

PACKET ENCRYPTION

RADIUS
RADIUS encrypts only the password in the access-request packet, from the client to the server. The remainder of the packet is unencrypted. Other information, such as username, authorized services, and accounting, can be captured by a third party.

TACACS+
TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header. Within the header is a field that indicates whether the body is encrypted or not. For debugging purposes, it is useful to have the body of the packets unencrypted. However, during normal operation, the body of the packet is fully encrypted for more secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CobiT was developed from the COSO framework. Which of the choices below best describe the COSO’s main objectives and purpose?

COSO main purpose is to help ensure fraudulent financial reporting cannot take place in an organization

COSO main purpose is to define a sound risk management approach within financial companies.

COSO addresses corporate culture and policy development.

COSO is risk management system used for the protection of federal systems.

A

COSO main purpose is to help ensure fraudulent financial reporting cannot take place in an organization

The Committee of Sponsoring Organizations of the Treadway Commission (COSO)2 was formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting, which studied factors that lead to fraudulent financial reporting and produced recommendations for public companies, their auditors, the Securities Exchange Commission, and other regulators.

COSO identifies five areas of internal control necessary to meet the financial reporting and disclosure objectives.

These include:

(1) control environment,
(2) risk assessment,
(3) control activities,
(4) information and communication, and
(5) monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following answers can use RC4 for encryption?

SSL and WEP
SSL and CHAP
CHAP and 3DES
WEP and AES

A

SSL and WEP

SSL can use a wide variety of key algorithms including RC4, RC2, DES, 3DES, Idea, Fortezza, AES and others.

WEP uses the RC4 encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Suppose that you are the COMSEC - Communications Security custodian for a large, multinational corporation. Susie, from Finance approaches you in the break room saying that she lost her smart ID Card that she uses to digitally sign and encrypt emails in the PKI.

What happens to the certificates contained on the smart card after the security officer takes appropriate action?

They are added to the CRL
They are reissued to the user
New certificates are issued to the user
The user may no longer have certificates

A

They are added to the CRL

Smart ID Cards can contain digital certifications user for establishing identity and for digitally encrypting and decrypting messages.

Commonly, there are three types of certificates on an ID Card: Identity certificate, private certificate and public certificate:

  • Identity Certificate: This is the cert used to guarantee your identity, as when you swipe to enter a facility or when logging onto a computer
  • Public Certificate: This is freely shared with the public. All who have it can use it to decrypt messages that you encrypt with your private key.
  • Private Certificate: This is the key that you use to encrypt messages. It is a complimentary key to your public key. Only your public key can decrypt messages encrypted with the private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which one of these answers is NOT a feature of WPA2?

Static Keys
Uses AES Encryption
Personal and Enterprise Version
Full IEEE 802.11i standard

A

Static Keys

Discussion: WPA2 implements IEEE 802.11i standards, uses AES encryption and is currently comes in two versions:

WPA2 Personal: AKA PSK Pre-shared key (Password)

WPA2 Enterprise: Requires a RADIUS Authentication Server and supports multiple accounts for each user

Static keys was an unfortunate feature of WEP which was partly to blame for its relatively short lifespan and quick replacement by WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following answers BEST depicts the whole purpose of Digital Certificates?

Primary method of uniquely identifying valid users
To encrypt messages
To decrypt messages
To take part in PKI

A

Primary method of uniquely identifying valid users and systems

The whole point behind using digital certificates is to uniquely identify not only users but also trusted systems. Routers, switches, servers, users and their computers can all be issued digital certificates permitting them to take part in a domain model in an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which answer BEST describes a technology that offers us the ability to segment network traffic and allow segregation of network users and resources from each other logically using features on enterprise switch?

VLANs
WANS
WLANS
STP

A

VLANs

VLANs or Virtual LANs were a way to mitigate broadcast traffic when hubs were still common. Back then with hubs, there was a single collision domain where all computers would ‘see’ all other traffic. This caused network latency and was a security risk after the rise of network sniffers.

VLANs allow us to assign physical switch ports to a specific VLAN to mitigate collision traffic, increase network performance, provide some level of security by isolating sensitive traffic.

Basically, the switch administrator assigns computers to a VLAN, often times by the department of the user. E.g., finance, personnel, marketing etc. This is not a great security benefit but can limit access to sensitive VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following statement correctly describes the differences between tunnel mode and transport mode of the IPSec protocol?

In tunnel mode the ESP is encrypted where as in transport mode the ESP and its header’s are encrypted

In transport mode the ESP is encrypted where as in tunnel mode the ESP and its header’s are encrypted

There is no encryption provided when using ESP or AH

In both modes (tunnel and transport mode) the ESP and its header’s are encrypted

A

In transport mode the ESP is encrypted where as in tunnel mode the ESP and its header’s are encrypted.

ESP can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and (limited) traffic flow confidentiality. The set of services provided depends on options selected at the time of Security Association (SA) establishment and on the location of the implementation in a network topology.For you exam you should know the information below about the IPSec protocol:
The IP network layer packet security protocol establishes VPNs via transport and tunnel mode encryption methods.

For the transport method, the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it is ESP that provides confidentiality over the process.

In the tunnel mode, the ESP payload and its header’s are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which key is used by the sender of a message to create a digital signature for the message being sent?

Sender’s public key
Sender’s private key
Receiver’s public key
Receiver’s private key

A

The sender private key is used to calculate the digital singaure

The digital signature is used to archieve integrity, authenticity and non-repudiation. In a digital signature, the sender’s private key is used to encrypt the message disgest (signing) of the message and receiver need to decrypt the same using sender’s public key to validate the signature.

Tip for the exam:

Digital Signature does not provide confidentiality. The sender’s private key is used for calulating digital signature

Encryption provides only confidentiality. The receiver’s public key or symmetric key is used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following device in Frame Relay WAN technique is a service provider device that does the actual data transmission and switching in the frame relay cloud?

DTE
DCE
DME
DLE

A

DCE

Data Circuit Terminal Equipment (DCE) is a service provider device that does the actual data transmission and switching in the frame relay cloud.

For your exam you should know below information about WAN Technologies:

Point-to-point protocol

PPP (Point-to-Point Protocol) is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. For example, your Internet server provider may provide you with a PPP connection so that the provider’s server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol (IP) (and is designed to handle others). It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the Open Systems Interconnection (OSI) reference model, PPP provides layer 2 (data-link layer) service. Essentially, it packages your computer’s TCP/IP packets and forwards them to the server where they can actually be put on the Internet.

PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber optic lines or satellite transmission. It uses a variation of High Speed Data Link Control (HDLC) for packet encapsulation.

PPP is usually preferred over the earlier de facto standard Serial Line Internet Protocol (SLIP) because it can handle synchronous as well as asynchronous communication. PPP can share a line with other users and it has error detection that SLIP lacks. Where a choice is possible, PPP is preferred.

X.25
X.25 is an ITU-T standard protocol suite for packet switched wide area network (WAN) communication.
X.25 is a packet switching technology which uses carrier switch to provide connectivity for many different networks.
Subscribers are charged based on amount of bandwidth they use. Data are divided into 128 bytes and encapsulated in High Level Data Link Control (HDLC).
X.25 works at network and data link layer of an OSI model.

Frame Relay
Works on a packet switching
Operates at data link layer of an OSI model
Companies that pay more to ensure that a higher level of bandwidth will always be available, pay a committed information rate or CIR
Two main types of equipments are used in Frame Relay
1. Data Terminal Equipment (DTE) - Usually a customer owned device that provides a connectivity between company’s own network and the frame relay’s network.

  1. Data Circuit Terminal Equipment (DCE) - Service provider device that does the actual data transmission and switching in the frame relay cloud.

The Frame relay cloud is the collection of DCE that provides that provides switching and data communication functionality. Frame relay is any to any service.

Integrated Service Digital Network

Enables data,voice and other types of traffic to travel over a medium in a digital manner previously used only for analog voice transmission.
Same copper telephone wire is used.
Provide digital point-to-point circuit switching medium

Asynchronous Transfer Mode (ATM)
Uses Cell switching method
High speed network technology used for LAN, MAN and WAN
Like a frame relay it is connection oriented technology which creates and uses fixed channel
Data are segmented into fixed size cell of 53 bytes
Some companies have replaces FDDI back-end with ATM

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) is a standards-approved technology for speeding up network traffic flow and making it easier to manage. MPLS involves setting up a specific path for a given sequence of packets, identified by a label put in each packet, thus saving the time needed for a router to look up the address to the next node to forward the packet to. MPLS is called multiprotocol because it works with the Internet Protocol (IP), Asynchronous Transport Mode (ATM), and frame relay network protocols. With reference to the standard model for a network (the Open Systems Interconnection, or OSI model), MPLS allows most packets to be forwarded at the Layer 2 (switching) level rather than at the Layer 3 (routing) level. In addition to moving traffic faster overall, MPLS makes it easy to manage a network for quality of service (QoS). For these reasons, the technique is expected to be readily adopted as networks begin to carry more and different mixtures of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Access Control Types and Categories

A
  • Access Control Types:
    • Administrative
      • Policies, data classification and labeling and security awareness training
    • Technical
      • Hardware - MAC Filtering or perimeter devices
      • Software controls like account logons and encryption, file perms
    • Physical
      • Guard, fences and locks
  • Access Control Categories:
    Directive: specify rules of acceptable behavior
    - Policy stating users may not use Facebook
    Deterrent:
    - Designed to discourage people from violating security directives
    - Logon banner reminding users about being subject to monitoring
    Preventive:
    - Implemented to prevent a security incident or information breach
    - Like a fence or file permissions
    Detective:
    - Used to mitigate the loss.
    - Example: Logging, IDS with a Firewall
    Compensating:
    - To substitute for the loss of a primary control of add additional mitigation
    - Example: Logging, IDS inline with firewall
    Corrective:
    - To remedy, mitigate damage, or restore control
    - Example: Fire extinguisher, firing an employee
    Recovery:
    - To restore conditions to normal after a security incident
    - Restore files from backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This standard was proposed in 1991. It is based on a public key algorithm but it does not provide for confidentiality of the message with encryption and is NOT used for key exchange.

Message Authentication Code

Digital Signature Standard

Digital Encryption Standard

HMAC - Hash Based Message authentication code

A

The correct answer is: Digital Signature Standard

The DSS was proposed in 1991 as FIPS 186 using the Secure Hashing Algorithm (SHA). It has since been updated several times, most recently in 2009, when it was issued as FIPS 186-3 and expanded to include the Digital Signature Algorithm (DSA) based on RSA and ECC. Contrasted with RSA, a digital signature is based on a public key (asymmetric) algorithm, but it does not provide for confidentiality of the message through encryption and is not used for key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following control provides an alternative way of regaining control if a control fails?

Deterrent Access Control
Preventative Controls
Detective Access Control
Compensating Access Control

A

Compensating Access Control

Compensating controls are introduced when the existing capabilities of a system do not support the requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an existing system may not support the required controls, there may exist other technology or processes that can supplement the existing environment, closing the gap in controls, meeting policy requirements, and reducing overall risk.

Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to threats and attacks by the simple fact that the existence of the control is enough to keep some potential attackers from attempting to circumvent the control. This is often because the effort required to circumvent the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing the identification and authentication of a user, service, or application, and all that it implies, the potential for incidents associated with the system is significantly reduced because an attacker will fear association with the incident. If there are no controls for a given access path, the number of incidents and the potential impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to intentionally perform unauthorized functions, leading to unwanted events. When users begin to understand that by authenticating into a system to perform a function, their activities are logged and monitored, and it reduces the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat agent, and any potential for identification and association with their actions is avoided at all costs. It is this fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also take the form of potential punishment if users do something unauthorized. For example, if the organization policy specifies that an employee installing an unauthorized wireless access point will be fired, that will determine most employees from installing wireless access points.

Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a user from performing some activity or function. Preventative controls differ from deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is easier to obey the control
rather than to risk the consequences of bypassing the control. In other words, the power for action resides with the user (or the attacker). Preventative controls place the power of action with the system, obeying the control is not optional. The only way to bypass the control is to
find a flaw in the control’s implementation.

Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support the requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an existing system may not support the required controls, there may exist other
technology or processes that can supplement the existing environment, closing the gap in controls, meeting policy requirements, and reducing overall risk. For example, the access control policy may state that the authentication process must be encrypted when performed over the Internet. Adjusting an application to natively support encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be employed and layered on top of the authentication process to support the policy statement. Other examples include a separation of duties environment, which offers the capability to isolate certain tasks to compensate for technical limitations in the system and ensure the security of transactions. In addition, management processes, such as authorization, supervision, and administration, can be used to compensate for gaps in the access control environment.

Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post-incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful incidents through the application of least privilege. However, the detective
nature of access controls can provide significant visibility into the access environment and help organizations manage their access strategy and related security risk. As mentioned previously, strongly managed access privileges provided to an authenticated user offer the ability to reduce the risk exposure of the enterprise’s assets by limiting the capabilities that authenticated user has. However, there are few options to control what a user can perform once privileges are provided. For example, if a user is provided write access to a file and that file is damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of applied access controls will offer visibility into the transaction. The control environment can be established to log activity regarding the identification, authentication, authorization, and use of privileges on a system. This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to validate when provided credentials were exercised. The logging system as a detective device provides evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users.

Corrective Controls
When a security incident occurs, elements within the security infrastructure may require corrective actions. Corrective controls are actions that seek to alter the security posture of an environment to correct any deficiencies and return the environment to a secure state. A security
incident signals the failure of one or more directive, deterrent, preventative, or compensating controls. The detective controls may have triggered an alarm or notification, but now the corrective controls must work to stop the incident in its tracks. Corrective controls can take
many forms, all depending on the particular situation at hand or the particular security failure that needs to be dealt with.

Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to offer temporary compensating controls, need to be accurately reinstated and returned to normal operations. There are several situations that may affect access controls, their applicability, status, or management. Events can include system outages, attacks, project changes, technical demands, administrative gaps, and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it may adversely affect controls placed on system files or even have default administrative accounts unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on temporary leave that may affect policy requirements regarding separation of duties. An attack on systems may have resulted in the implantation of a Trojan horse program, potentially exposing private user information, such as credit card information and financial data. In all of these cases, an undesirable situation must be rectified as quickly as possible and controls returned to normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which term BEST describes software which lets multiple services on one computer or multiple computers to interact as one?

Embedded Ware
Middleware
Firmware
Signoware

A

Middleware

The communication between these two pieces of the same software product needs to be controlled, which is why the session layer protocols within the OSI model exist. Session layer protocols take on the functionality of middleware, which allows software on two different computers to communicate.

Middleware is connectivity software that enables multiple processes running on one or more machines to interact. These services are collections of distributed software that are present between the application running on the OS and the network services, which reside on a network node. The main purpose of middleware services is to help solve many application connectivity and interoperability problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

This method requires that the station possess a digital series of bits sometimes called a frame, indicating that it has permission to talk on the network:

CSMA/CD
CSMA/CA
Certificate Possession
Token Passing

A

Token Passing

A token is a 24-bit control frame used to control which computers communicate at what intervals. The token is passed from computer to computer, and only the computer that has the token can actually put frames onto the wire. The token grants a computer the right to communicate. The token contains the data to be transmitted and source and destination address information. When a system has data it needs to transmit, it has to wait to receive the token. The computer then connects its message to the token and puts it on the wire. Each computer checks this message to determine whether it is addressed to it, which continues until the destination computer receives the message. The destination computer makes a copy of the message and flips a bit to tell the source computer it did indeed get its message. Once this gets back to the source computer, it removes the frames from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following network device combines the functionality of a repeater and the functionality of a bridge?

Repeater
Hub
Router
Switches

A

Switches

Switches combine the functionality of a repeater and the functionality of a bridge. A switch amplifies the electrical signal, like a repeater, and has the built-in circuitry and intelligence of a bridge.

Exam tip

Repeater - A repeater provides the simplest type of connectivity, because it only repeats electrical signals between cable segments, which enables it to extend a network. Repeaters work at the physical layer and are add-on devices for extending a network connection over a greater distance. The device amplifies signals because signals attenuate the farther they have to travel.

Hub - A hub is a multi-port repeater. A hub is often referred to as a concentrator because it is the physical communication device that allows several computers and devices to communicate with each other. A hub does not understand or work with IP or MAC addresses.

Routers - Routers are layer 3, or network layer, devices that are used to connect similar or different networks. (For example, they can connect two Ethernet LANs or an Ethernet LAN to a Token Ring LAN.) A router is a device that has two or more interfaces and a routing table so it knows how to get packets to their destinations. It can filter traffic based on access control lists (ACLs), and it fragments packets when necessary.

Gateways
Gateway is a general term for software running on a device that connects two different environments and that many times acts as a translator for them or somehow restricts their interactions. Usually a gateway is needed when one environment speaks a different language, meaning it uses a certain protocol that the other environment does not understand. The gateway can translate Internetwork Packet Exchange (IPX) protocol
packets to IP packets, accept mail from one type of mail server and format it so another type of mail server can accept and understand it, or connect and translate different data link technologies such as FDDI to Ethernet.

Bridges
A bridge is a LAN device used to connect LAN segments. It works at the data link layer and therefore works with MAC addresses. A repeater does not work with addresses; it just forwards all signals it receives. When a frame arrives at a bridge, the bridge determines whether or not the MAC address is on the local network segment. If the MAC address is not on the local network segment, the bridge forwards the frame to the necessary network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IPSec Encapsulating Security Payload (ESP) provides some of the services of Authentication Headers (AH), but it is primarily designed to provide:

Confidentiality
Cryptography
Digital signatures
Access Control

A

Confidentiality

IPSec is an open standard that uses the following protocols to perform various functions:

Authentication Header - provide connectionless integrity and data origin authentication for IP datagrams. Also protects against replay attacks.

Encapsulating Security Payload - ESP: This provides origin authenticity, integrity and confidentiality of packets. It supports both encryption-only and authentication-only configurations.

Internet Protocol Security (IPSec)

The Internet Protocol Security (IPSec) protocol suite provides a method of setting up a secure channel for protected data exchange between two devices. The devices that share this secure channel can be two servers, two routers, a workstation and a server, or two gateways between different networks. IPSec is a widely accepted standard for providing
network layer protection. It can be more flexible and less expensive than end-toend and link encryption methods.
IPSec has strong encryption and authentication methods, and although it can be used to enable tunneled communication between two computers, it is usually employed to establish virtual private networks (VPNs) among networks across the Internet.
IPSec is not a strict protocol that dictates the type of algorithm, keys, and authentication method to use. Rather, it is an open, modular framework that provides a lot of flexibility for companies when they choose to use this type of technology. IPSec uses two basic security protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP). AH is the authenticating protocol, and ESP is an authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.
IPSec can work in one of two modes: transport mode, in which the payload of the message is protected, and tunnel mode, in which the payload and the routing and header information are protected. ESP in transport mode encrypts the actual message information so it cannot be sniffed and uncovered by an unauthorized entity. Tunnel mode provides a higher level of protection by also protecting the header and trailer data an attacker may find useful.

Each device will have at least one security association (SA) for each secure connection it uses. The SA, which is critical to the IPSec architecture, is a record of the configurations the device needs to support an IPSec connection. When two devices complete their handshaking process, which means they have agreed upon a long list of parameters they will use to communicate, these data must be recorded and stored somewhere, which is in the SA. The SA can contain the authentication and encryption keys, the agreed-upon algorithms, the key lifetime, and the source IP address. When a device receives a packet via the IPSec protocol, it is the SA that tells the device what to do with the packet. So if device B receives a packet from device C via IPSec, device B will look to the corresponding SA to tell it how to decrypt the packet, how to properly authenticate the source of the packet, which key to use, and how to reply to the message if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Imagine you are looking at a packet capture of traffic from a client requesting access to the SSH daemon on a server. You find the initial SYN packets from the client have seemingly random target ports and finally TCP/22 at which point the client is granted access to the SSH Daemon by the firewall. What are you seeing?

Port Knocking
SYN Cookies
Browser Cookies
Dynamic Firewall Rules

A

Port Knocking

Servers can use the process called port knocking where the service listens only to clients who successfully send a series of packets to a required series of ports to meet the proper sequence.

When TCP conversations occur between two hosts on a network, the traffic is directed between TCP ports on the two hosts. Generally SSH servers listen on 22/TCP so that clients know which port should be listening on the server.

After the proper sequence is seen the firewall rules are dynamically modified to permit that host’s source IP Address from accessing the desired service. There is a variant of this involving a single encrypted TCP Packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is a best practice for defending against Bluetooth hacking?

Keep Bluetooth devices in non-discoverable mode

Keep the device in Bluetooth discoverable mode

Disable encryption for Bluetooth

Use default numbers as PIN keys

A

One of the best ways to defend against Bluetooth hackers is to keep your devices in non-discoverable mode. This way they don’t even respond to unsolicited requests for pairing.

Bluetooth is a short-range wireless technology used to eliminate the need for cables over short distances. It is commonly used on PC peripherals like keyboards and mouse devices but also the ubiquitous Bluetooth ear piece tethered to a cell phone.

Common Bluetooth Attacks are:
Bluesmacking: DoS attack which overflows Bluetooth-enabled devices with random packets causing the device to crash.
Blue Snarfing: The theft of information from a wireless device through a Bluetooth connection.
BlueJacking: The art of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as PDA and mobile phones.
BlueSniff: Proof of concept code for a Bluetooth wardriving utility.

Mitigation: Other ways to defend against Bluetooth attacks are:

  • Use non-default PINS while pairing devices
  • Pair devices out of general public areas like at home
  • Always enable encryption
  • Periodically check your list of paired devices and remove unused or unknown devices
  • Keep Bluetooth in disabled mode when you don’t use it.
  • Do NOT accept unknown and unexpected requests for pairing with another device you did not expect.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

When you carry out an ACK scan of your web servers you find that they are responding to ACK packets sent to port TCP/80.

What is the possible problem here?

The servers are using a stateless firewall

They are using a Windows based firewall

A stateful firewall is being used on those servers

An Active ARP Cache is in use

A

The servers are using a stateless firewall

This is the correct answer because a computer with a stateless firewall would respond to ACK packets sent to port TCP/80 when the port should not respond to unsolicited ACK packets for a non-existent TCP session.

DISCUSSION:
Summary: Stateless firewalls are not aware of the concept of TCP state so that if an ACK packet arrives it is assumed by the firewall to be simply part of an established conversation and the traffic is passed through the firewall.

Mitigation: Always use stateful firewalls on your hosts. Stateless firewalls should be replaced with stateful firewalls to avoid the condition depicted in the question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following is NOT an example of an operational control?

backup and recovery
Auditing
contingency planning
operations procedures

A

auditing.

Operational controls are controls over the hardware, the media used and the operators using these resources.

Operational controls are controls that are implemented and executed by people, they are most often procedures.

Backup and recovery, contingency planning and operations procedures are operational controls.

Auditing is considered an Administrative / detective control. However the actual auditing mechanisms in place on the systems would be consider operational controls.

52
Q

Card Types

A

Card Types

Magnetic stripe (mag stripe) cards consist of a magnetically sensitive strip fused onto the surface of a PVC material, like a credit card. A magnetic stripe card is read by swiping it through a reader or by inserting it into a position in a slot.

This style of card is old technology; it may be physically damaged by misuse, and its data can be affected by magnetic fields. Magnetic stripe cards are easily duplicated. Proximity cards (prox cards) use embedded antenna wires connected to a chip within the card. The chip is encoded with the unique card identification. Distances at which proximity cards can be read vary by the manufacturer and installation. Readers can require the card to be placed within a fraction of an inch from the reader to six inches away. This will then authenticate the card and will release the magnetic lock on the door. Smart cards are credential cards with a microchip embedded in them. Smart cards can store data such as access transactions, licenses held by individuals, qualifications, safety training, security access levels, and biometric templates. This card can double as an access card for doors and be used as an authenticator for a computer.

The U.S. federal government has mandated smart cards to provide personal identity verification (PIV) to verify the identity of every employee and contractor in order to improve data and facility security. The card will be used for identification, as well as for facility and data access. Additional security measures can be employed using keypads with PIN Codes or biometric readers. Coded devices use a series of assigned numbers commonly referred to as a PIN. This series of numbers is entered into a keypad and is matched to the numbers stored in the ACS. This provides additional security because if a badge is lost or stolen, it will not activate a control area without the proper PIN number, similar to an ATM bank card. Biometrics provides the same support because even if the card is stolen, the reader must match a biometric to the biometric on the card to be successful.

53
Q

Which of the following should NOT be a role of the Security Administrator?

A

Authorizing access rights

54
Q

Who should provide access authorization to computerized information?

A

The data owner has the power to determine who can (and cannot) access that data based on the business requirements and constraints affecting that owner.

55
Q

Secure Shell (SSH) is a strong method of performing:

A

Client authentication

Secure shell (SSH) was designed as an alternative to some of the insecure protocols and allows users to securely access resources on remote computers over an encrypted tunnel. The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol.

56
Q

A variation of the application layer firewall is called a:

A

Circuit level Proxy

A circuit-level proxy creates a conduit through which a trusted host can communicate with an untrusted one. This type of proxy does not inspect any of the traffic that it forwards, which adds very little overhead to the communication between the user and untrusted server. The lack of application awareness also allows circuit-level proxies to forward any traffic to any TCP and UDP port. The disadvantage is that traffic will not be analyzed for malicious content.

57
Q

A circuit level proxy is ___________________ when compared to an application level proxy.

A

lower in processing overhead.

Since the circuit level proxy does not anayze the application content of the packet in making its decisions, it has lower overhead than an application level proxy.

58
Q

What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of an information system?

Accountability controls
Mandatory access controls
Assurance procedures
Administrative controls

A

Assurance procedures

Controls provide accountability for individuals accessing information. Assurance procedures ensure that access control mechanisms correctly implement the security policy for the entire life cycle of an information system.

59
Q

What is the primary focus of using redundant array of inexpensive disks (RAID) level zero ?

To improve system performance.

To maximize usage of hard disk space.

To provide fault tolerance and protection against file server hard disk crashes.

To implement integrity.

A

To improve system performance

This question is asking what the primary focus of RAID 0 is.

60
Q

Which RAID implementation creates one large disk by using two disks as one large volume?

A

RAID level 0

RAID level 0 creates one large disk by using several disks, in a process call striping.

It stripes data across all disks, improving performance, but provides no redundancy and lessens fault tolerance by making the entire data volume unusable should one of the disks fail.

61
Q

Which of the following statements pertaining to Kerberos is false?

The Key Distribution Center represents a single point of failure.

Kerberos manages access permissions.

Kerberos uses a database to keep a copy of all users’ public keys.

Kerberos uses symmetric key cryptography.

A

Kerberos uses a database to keep a copy of all users’ public keys.

Kerberos is a trusted, credential-based, third-party authentication protocol that uses symmetric (secret) key cryptography to provide robust authentication to clients accessing services on a network.

One weakness of Kerberos is its Key Distribution Center (KDC), which represents a single point of failure.

The KDC contains a database that holds a copy of all of the symmetric/secret keys for the principals.

62
Q

When it comes to security within databases, which of the following is NOT a responsibility of a database administrator?

A

Providing access authorization to databases

The data owner, not the database administrator, is responsible for accurate use of the information and should normally provide authorization for users to gain access to computerized information.

The database administrator (DBA) handles technical matters, not access authorization to data. The Database Administrator will configure and grant access to the users in accordance with the data owner decisions.

63
Q

Which of the following would not correspond to the number of primary keys values found in a table in a relational database?

Degree
Number of tuples
Cardinality
Number of rows

A

Degree

The degree of a table represents the number of columns in a table.

All other elements represent the number of rows, or records, thus the number of unique primary keys values within the table.

64
Q

Which of the following is used to find the Media Access Control (MAC) address that matches a known Internet Protocol (IP) address?

A

Address Resolution Protocol (ARP).

Reverse Address Resolution Protocol (RARP) is used to find the IP address that matches an Ethernet address.

MAC address is often referred to as the Ethernet Address on an Ethernet network.

They are in fact the same thing.

65
Q

An effective information security policy should not have which of the following characteristic?

A

Be designed with a short- to mid-term focus

An effective information security policy should be designed with a long-term focus. All other characteristics apply.

66
Q

What are cognitive passwords?

A

Fact or opinion-based information used to verify an individual’s identity.

Cognitive passwords are fact or opinion-based information used to verify an individual’s identity.

67
Q

Which software development model is actually a meta-model that incorporates a number of the software development models?

A

Spiral model

The spiral model is actually a meta-model that incorporates a number of the software development models.

This model depicts a spiral that incorporates the various phases of software development. The model states that each cycle of the spiral involves the same series of steps for each part of the project.

68
Q

Which of the following encryption algorithms does not deal with discrete logarithms?

El Gamal
Diffie-Hellman
RSA
Elliptic Curve

A

RSA

The security of the RSA system is based on the assumption that factoring the product into two original large prime numbers is difficult

69
Q

Echo reply blocking

A

Echo replies outbound should be dropped, not allowed. There is no reason for any internet users to send ICMP ECHO Request to your interal hosts from the internet. If they wish to find out if a service is available, they can use a browser to connect to your web server or simply send an email if they wish to test your mail service.

Echo replies outbound could be used as part of the SMURF amplification attack where someone will send ICMP echo requests to gateways broadcast addresses in order to amplify the request by X number of users sitting behind the gateway.

By allowing inbound echo requests and outbound echo replies, it makes it easier for attackers to learn about the internal network as well by performing a simply ping sweep. ICMP can also be used to find out which host has been up and running the longest which would indicates which patches are missing on the host if a critical patch required a reboot.

ICMP can also be use for DDoS attacks, so you should strictly limit what type of ICMP traffic would be allowed to flow through your firewall.

On top of all this, tools such as LOKI could be use as a client-server application to transfer files back and forward between the internat and some of your internal hosts. LOKI is a client/server program published in the online publication Phrack . This program is a working proof-of-concept to demonstrate that data can be transmitted somewhat secretly across a network by hiding it in traffic that normally does not contain payloads. The example code can tunnel the equivalent of a Unix RCMD/RSH session in either ICMP echo request (ping) packets or UDP traffic to the DNS port. This is used as a back door into a Unix system after root access has been compromised. Presence of LOKI on a system is evidence that the system has been compromised in the past.

The outbound echo request and inbound echo reply allow internal users to verify connectivity with external hosts.

70
Q

Which of the following describes the sequence of steps required for a Kerberos session to be established between a user (Principal P1), and an application server (Principal P2)?

A

Principal P1 authenticates to the Key Distribution Center (KDC), principal P1 receives a Ticket Granting Ticket (TGT), and principal P1 requests a service ticket from the Ticket Granting Service (TGS) in order to access the application server P2.

71
Q

Common Criteria 15408 generally outlines assurance and functional requirements through a security evaluation process concept of ______________, ____________, __________ for Evaluated Assurance Levels (EALs) to certify a product or system.

A

Protection Profile, Target of Evaluation, Security Target

This lists the correct sequential order of these applied concepts to formally conducts tests that evaluate a product or system for the certification for federal global information systems.

Common Criteria evaluations are performed on computer security products and systems. There are many terms related to Common Criteria and you must be familiar with them.

Target Of Evaluation (TOE) – the product or system that is the subject of the evaluation.
The evaluation serves to validate claims made about the target. To be of practical use, the evaluation must verify the target’s security features. This is done through the following:

Protection Profile (PP) – a document, typically created by a user or user community, which identifies security requirements for a class of security devices (for example, smart cards used to provide digital signatures, or network firewalls) relevant to that user for a particular purpose. Product vendors can choose to implement products that comply with one or more PPs, and have their products evaluated against those PPs. In such a case, a PP may serve as a template for the product's ST (Security Target, as defined below), or the authors of the ST will at least ensure that all requirements in relevant PPs also appear in the target's ST document. Customers looking for particular types of products can focus on those certified against the PP that meets their requirements.
Security Target (ST) – the document that identifies the security properties of the target of evaluation. It is what the vendor claim the product can do.   It may refer to one or more PPs. The TOE is evaluated against the SFRs (see below) established in its ST, no more and no less. This allows vendors to tailor the evaluation to accurately match the intended capabilities of their product. This means that a network firewall does not have to meet the same functional requirements as a database management system, and that different firewalls may in fact be evaluated against completely different lists of requirements. The ST is usually published so that potential customers may determine the specific security features that have been certified by the evaluation
The evaluation process also tries to establish the level of confidence that may be placed in the product's security features through quality assurance processes:

Security Assurance Requirements (SARs) – descriptions of the measures taken during development and evaluation of the product to assure compliance with the claimed security functionality. For example, an evaluation may require that all source code is kept in a change management system, or that full functional testing is performed. The Common Criteria provides a catalogue of these, and the requirements may vary from one evaluation to the next. The requirements for particular targets or types of products are documented in the ST and PP, respectively.
Evaluation Assurance Level (EAL) – the numerical rating describing the depth and rigor of an evaluation. Each EAL corresponds to a package of security assurance requirements (SARs, see above) which covers the complete development of a product, with a given level of strictness. Common Criteria lists seven levels, with EAL 1 being the most basic (and therefore cheapest to implement and evaluate) and EAL 7 being the most stringent (and most expensive). Normally, an ST or PP author will not select assurance requirements individually but choose one of these packages, possibly ‘augmenting’ requirements in a few areas with requirements from a higher level. Higher EALs do not necessarily imply “better security”, they only mean that the claimed security assurance of the TOE has been more extensively verified.
Security Functional Requirements (SFRs) – specify individual security functions which may be provided by a product. The Common Criteria presents a standard catalogue of such functions. For example, a SFR may state how a user acting a particular role might be authenticated. The list of SFRs can vary from one evaluation to the next, even if two targets are the same type of product. Although Common Criteria does not prescribe any SFRs to be included in an ST, it identifies dependencies where the correct operation of one function (such as the ability to limit access according to roles) is dependent on another (such as the ability to identify individual roles).
So far, most PPs and most evaluated STs/certified products have been for IT components (e.g., firewalls, operating systems, smart cards). Common Criteria certification is sometimes specified for IT procurement. Other standards containing, e.g., interoperation, system management, user training, supplement CC and other product standards. Examples include the ISO/IEC 17799 (Or more properly BS 7799-1, which is now ISO/IEC 27002) or the German IT-Grundschutzhandbuch.

Details of cryptographic implementation within the TOE are outside the scope of the CC. Instead, national standards, like FIPS 140-2 give the specifications for cryptographic modules, and various standards specify the cryptographic algorithms in use.

More recently, PP authors are including cryptographic requirements for CC evaluations that would typically be covered by FIPS 140-2 evaluations, broadening the bounds of the CC through scheme-specific interpretations.

72
Q

Which field in a TCP header is used to reassemble a file back into proper order to be presented to the receiver?

A

TCP Sequence Number

TCP Sequence Numbers (Byte Offset 4-7) are, in part, used to reassemble packets back into original order for presentation to the recipient.

Each TCP frame received has a sequence number in the TCP Header. It’s a 32-bit number and during TCP Session establishment, each station selects an ISN - Initial Sequence Number (Randomly generated at best) as their first sequence number.

Sequence numbers also advise the recipient of missing packets so they may be re-requested from the sender. If packets are lost due to network congestions or transmission problems the TCP Windows (Number of packets which can be sent without an ACK of reception.) will be smaller and more ACKs must be sent to see if packets are getting to the destination.

73
Q

Which of the following statement correctly describes difference between SSL and S/HTTP?

Both works at transport layer

S/HTTP works at transport layer where as SSL works at the application layer of OSI model

SSL works at transport layer where as S/HTTP works at application layer of OSI model

Both works at application layer of OSI model

A

SSL works at transport layer where as S/HTTP works at application layer of OSI model

Secure Hypertext Transfer Protocol (S/HTTP) - As an application layer protocol, S/HTTP transmits individual messages or pages securely between a web client and server by establishing SSL-type connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to a secure port number rather than the default web port address. This protocol utilizes SSL secure features but does so as a message rather than the session-oriented protocol.

Secure Socket Layer (SSL) and Transport Layer Security (TLS) - These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.
SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.

SSL involves a number of basic phases
Peer negotiation for algorithm support
Public-key, encryption based key exchange and certificate based authentication
Symmetric cipher based traffic encryption.

SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.

SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.

The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiate the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.

74
Q

Which of the following malware prevention techniques fools malware by appending section of themselves to files. Somewhat in the same way that malware append itself to a file?

A

Immunizer

75
Q

Which of the following middleware program is responsible for queuing and prioritization of messages using a dedicated server?

TP Monitors
RPC
ORB
Messaging Server

A

Messaging Server

A messaging server is a middleware program that handles messages that are sent for use by other programs using a messaging application program interface (API). A messaging server can usually queue and prioritize messages as needed and saves each of the client programs from having to perform these services.

TP Monitor- A transaction processing monitor (TPM) is a program that monitors transactions from one stage to the next, ensuring that each one completes successfully; if not, or if an error occurs, the TM Monitor takes the appropriate action. A transaction processing monitor’s main purpose/objective is to allow resource sharing and assure optimal use of the resources by applications.

ORB - An object request broker (ORB) is a middleware application component that uses the common object request broker architecture (CORBA) specification, enabling developers to make application calls within a computer network. ORB is an agent that transmits client/server operation invocations in a distributed environment and ensures transparent object communication.

RPC - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network without having to understand network details. (A procedure call is also sometimes known as a function call or a subroutine call.) RPC uses the client/server model. The requesting program is a client and the service-providing program is the server. Like a regular or local procedure call, an RPC is a synchronous operation requiring the requesting program to be suspended until the results of the remote procedure are returned. However, the use of lightweight processes or threads that share the same address space allows multiple RPCs to be performed concurrently.

76
Q

Which of the following firewall rules found on a firewall installed between an organization’s internal network and the Internet would present the greatest danger to the internal network?

Permit all traffic between local hosts.

Permit all inbound SSH traffic.

Permit all inbound TCP connections.

Permit Syslog traffic to your centralized log server.

A

Permit all inbound TCP connections.

Any opening of an internal network to the Internet is susceptible of creating exposures, possible attack vectors, and exploitation of vulnerabilities. It would be crazy to do this, it is almost the same as having no firewall.

77
Q

Who is responsible for providing adequate physical and logical security for Information System (IS) program, data, and equipment?

Data User
Data Custodian
Security Administrator
Data Owner

A

Security Administrator

Security administrators are responsible for providing adequate physical and logical security for IS programs, data, and equipment.

78
Q

In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes.

Which of the following would have been true of a Class C network?

A

In binary, the first two bits of the IP address would be set to one and the third bit set to zero

This is the correct answer because if the first two bits of an IP Address in Binary are 2 then it’s a Class C network, as the questions requests.

So:
0 in binary is 0
128 in binary is 10000000
192 in binary is 11000000
224 in binary is 11100000
240 in binary is 11110000

For Class C, the addresses are 192.0.0.0 - 223.255.255.255
The lowest Class C address is represented in binary as 11000000.00000000.00000000.00000000

Another way to look at it is, 128+64 = 192.

For Class A, the addresses are 0.0.0.0 - 127.255.255.255
The lowest Class A address is represented in binary as 00000000.00000000.0000000.00000000

For Class B networks, the addresses are 128.0.0.0 - 191.255.255.255.
The lowest Class B address is represented in binary as 10000000.00000000.00000000.00000000

For Class C, the addresses are 192.0.0.0 - 223.255.255.255 (The question asked for a Class C network)
The lowest Class C address is represented in binary as 11000000.00000000.00000000.00000000

For Class D, the addresses are 224.0.0.0 - 239.255.255.255 (Multicast)
The lowest Class D address is represented in binary as 11100000.00000000.00000000.00000000

For Class E, the addresses are 240.0.0.0 - 255.255.255.255 (Reserved for future usage)
The lowest Class E address is represented in binary as 11110000.00000000.00000000.00000000

79
Q

What can be defined as a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data’s origin and integrity?

A digital envelope
A cryptographic hash
A Message Authentication Code
A digital signature

A

Digital Signature

RFC 2828 (Internet Security Glossary) defines a digital signature as a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data’s origin and integrity.

Digital Envelop - A Digital Envelope is a combination of encrypted data and its encryption key in an encrypted form that has been prepared for use of the recipient. In simple term it is a type of security that uses two layers of encryption to protect a message. First, the message itself is encoded using symmetric encryption, and then the key to decode the message is encrypted using public-key encryption.

Message Authentication Code - A Message Authentication Code (MAC) refers to an ANSI standard for a checksum that is computed with a keyed hash that is based on DES or it can also be produced without using DES by concataning the Secret Key at the end of the message (simply adding it at the end of the message) being sent and then producing a Message digest of the Message+Secret Key together.

Cryptographic Hash - A cryptographic hash is the result of a cryptographic hash function such as MD5, SHA-1, or SHA-2. A hash value also called a Message Digest is like a fingerprint of a message. It is used to proves integrity and ensure the message was not changed either in transit or in storage.

80
Q

Which of the following choices is a valid Public Key Cryptography Standard (PKCS) addressing RSA?

PKCS #17799
PKCS-RSA
PKCS#1
PKCS#11

A

PKCS #1: RSA Cryptography Standard
This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering the following aspects: cryptographic primitives; encryption schemes; signature schemes with appendix; ASN.1 syntax for representing keys and for identifying the schemes.

81
Q
Which of the following is the marriage of object-oriented and relational technologies combining the attributes of both?
object-relational database 
object-oriented database 
object-linking database 
object-management database
A

object-relational database

The object-relational database is the marriage of object-oriented and relational technologies and combines the attributes of both.

82
Q

the following is a CHARACTERISTIC of a decision support system (DSS) in regards to Threats and Risks Analysis?

A

Data collection method that happens in an anonymous fashion.

DSS emphasizes flexibility in the decision-making approach of users. It is aimed at solving less structured problems, combines the use of models and analytic techniques with traditional data access and retrieval functions and supports semi-structured decision-making tasks.

DSS is sometimes referred to as the Delphi Method or Delphi Technique:

The Delphi technique is a group decision method used to ensure that each member gives an honest opinion of what he or she thinks the result of a particular threat will be. This avoids a group of individuals feeling pressured to go along with others‚„¢ thought processes and enables them to participate in an independent and anonymous way.

83
Q

the following would provide the BEST stress testing environment taking under consideration and avoiding possible data exposure and leaks of sensitive data?

A

Test environment using sanitized live workloads data.

The best way to properly verify an application or system during a stress test would be to expose it to “live” data that has been sanitized to avoid exposing any sensitive information or Personally Identifiable Data (PII) while in a testing environment.

84
Q

What is called the formal acceptance of the adequacy of a system’s overall security by the management?

A

Accreditation

Accreditation is the authorization by management to implement software or systems in a production environment. This authorization may be either provisional or full.

85
Q

In the UTP category rating, the tighter the wind (or the tighter the cables are twisted together)

A

the higher the rating and its resistance against interference and crosstalk will be.

NOTE: wind within the question simply refer to how tightly the cables would be twisted.

The category rating is based on how tightly the copper cable is wound within the shielding: The tighter the wind, the higher the rating and its resistance against interference and crosstalk.

86
Q

SMTP can best be described as

A

a host-to-host email protocol.

Simple Mail Transfer Protocol (SMTP) is a host-to-host email protocol. An SMTP server accepts email messages from other systems and stores them for the addressees.

87
Q

Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?

Project Initiation and planning
Functional requirements Definition
System Design Specifiations
Testing and Evaluation Control

A

System Design Specifiations

This phase includes all activities related to designing the system and software. In this phase, the system architecture, system outputs, and system interfaces are designed. Data input, data flow, and output requirements are established and security features are designed, generally based on the overall security architecture for the company.

The basic phases of SDLC are:
Project initiation and planning
Functional requirements definition
System design specifications
Development and implementation
Documentation and common program controls
Testing and evaluation control (certification and accreditation)
Transition to production (implementation)

88
Q

A business continuity plan is an example of which of the following?

Corrective control
Detective control
Preventive control
Compensating control

A

Corrective Controls

Business Continuity Plans are designed to minimize the damage done by the event, and facilitate rapid restoration of the organization to its full operational capacity. They are for use “after the fact”, thus are examples of corrective controls.

89
Q

Which of the following was designed to support multiple network types over the same serial link?

Ethernet
SLIP
PPP
PPTP

A

PPP

The Point-to-Point Protocol (PPP) was designed to support multiple network types over the same serial link, just as Ethernet supports multiple network types over the same LAN.

PPP replaces the earlier Serial Line Internet Protocol (SLIP) that only supports IP over a serial link. PPTP is a tunneling protocol

90
Q

What is a security policy?

A

High level statements on management’s expectations that must be met in regards to security

91
Q
Which of the following answers is NOT associated with WPA - Wi-Fi Protected Access security technology for wireless networks?
ICV uses CRC-32  
Dynamic Encryption Keys 
128-Bit TKIP 
Per-frame Sequence counter
A

ICV uses CRC-32

WEP ICV - Integrity Check Value or hash sum is a small size and is based on CRC-32 an algorithm for detecting noise and common errors in transmission. CRC-32 is a great checksum for detecting errors but a bad choice for a cryptographic hash.

92
Q

What is the name of an algorithm that generates supposedly random numbers which are not truly random because the numbers are determined by a relatively small set of initial values in the algorithm?

A

Pseudorandom Number Generator

93
Q

What network-layer security protocol is built into IPv6 but is an add-on to IPv4?

A

IPSec

94
Q

There are many firewall implementations provided by firewall manufacturers. Which of the following implementation utilize two packet filtering routers and a bastion host? This approach creates the most secure firewall system since it supports network and application level security while defining a separate DMZ.

A

Screened subnet firewall

95
Q

How does the digital envelop work? What are the correct steps to follow?

A

You encrypt the data using the session key and then you encrypt the session key using the receiver’s public key

The process of encrypting bulk data using symmetric key cryptography and then encrypting the session key using a public key algorithm is referred as a digital envelope.

A Digital Envelope is used to send encrypted information using symmetric crypto cipher and then key session along with it. It is secure method to send electronic document without compromising the data integrity, authentication and non-repudiation, which were obtained with the use of symmetric keys.

A Digital envelope mechanism works as follows:

The symmetric key used to encrypt the message can be referred to as session key.

The bulk of the message would take advantage of the high speed provided by Symmetric Cipher.

The session key must then be communicated to the receiver in a secure way to allow the receiver to decrypt the message.

If the session key is sent to receiver in the plain text, it could be captured in clear text over the network and anyone could access the session key which would lead to confidentiality being compromised.

Therefore it is critical to encrypt the session key with the receiver public key before sending it to the receiver. The receiver’s will use their matching private key to decrypt the session key which then allow them to decrypt the message using the session key.

96
Q

Which of the following factor is LEAST important in the measurement of critical success factors of productivity in the SDLC phases?

Number of occurrences of fraud/misuse detection Number of transactions per user
Number of transactions per month
Dollar Spent per use

A

Number of occurrences of fraud/misuse detection

97
Q

Which framework is a Risk-driven enterprise security architecture that maps to business initiatives?

A

SABSA - Sherwood Applied Business Security Architecture

SABSA is a proven methodology for developing business-driven, risk and opportunity focused Security Architectures at both enterprise and solutions level that traceably support business objectives.

98
Q

Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer 7 of the ISO/OSI Model?

Bridge
Repeater
Router
Gateway

A

Gateway

A gateway is used to connect two networks using dissimilar protocols at the lower layers or it could also be at the highest level of the protocol stack.

Important Note:

For the purpose of the exam, you have to remember that a gateway is not synonymous to the term firewall.

The second thing you must remembers is the fact that a gateway act as a translation device.

99
Q

Which of the following answer specifies the correct sequence of levels within the Capability Maturity Model (CMM)?

A

Initial, Managed, Defined, Quantitatively Managed, Optimizing

Note: Some books will call the Managed level Repeatable. ISC says Managed.

Initial- the starting point for use of a new or undocumented repeat process.

Managed - the process is at least documented sufficiently such that repeating the same steps may be attempted.

Defined - the process is defined/confirmed as a standard business process, and decomposed to levels 0, 1 and 2 (the last being Work Instructions).

Quantitatively Managed - the process is quantitatively managed in accordance with agreed-upon metrics.

Optimizing - process management includes deliberate process optimization/improvement.

100
Q

A Differential backup process will:

A

Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1

101
Q

On which of the following protocols does the tool Firewalk or the technique Firewalking primarily rely on?

A

ICMP - Internet Control Message Protocol

Firewalking is a term used to describe how internal networks can be mapped from outside a firewall protected network by sending crafted ICMP packets with their TTL - Time To Live decremented to the number of hops to the external interface of the external firewall.

The goal is to elicit ICMP Time Exceeded (Type 11 - Code 0. Technically it’s TTL Exceeded) to map out devices on the far side of a firewall.

102
Q

Port numbers

A
FTP: 20-21
SSH: 22
Telnet: 23
SMTP: 25
TACACS: 49
DNS: 53
TFTP: 69
HTTP: 80
KERBEROS: 88
POP3: 110
POP3 SSL: 995
NETBIOS: 137-139
IMAP4: 143
IMAP SSL: 993
SNMP: 161-162
LDAP: 389
LDAP SSL: 636
HTTPS: 443
SMTP: 587
103
Q

Which of the following is NOT a type of motion detector using the doppler effect or change in heat energy?

Photoelectric sensor
Passive infrared sensors
Microwave Sensor.
Ultrasonic Sensor.

A

Photoelectric sensor

A photoelectric sensor does not “directly” sense motion there is a narrow beam that won’t set off the sensor unless the beam is broken. Photoelectric sensors, along with dry contact switches, are a type of perimeter intrusion detector.

104
Q

The Information Technology Security Evaluation Criteria (ITSEC) was written to address which of the following that the Orange Book did not address?

integrity and confidentiality.
confidentiality and availability.
integrity and availability.
None of the answers presented apply

A

integrity and availability.

105
Q

Clark-Wilson goals

A

Integrity is addressed through the following three goals:

  1. Prevention of the modification of information by unauthorized users.
  2. Prevention of the unauthorized or unintentional modification of information by authorized users.
  3. Preservation of the internal and external consistency.
106
Q

A database view is the results of which of the following operations?

A

Join, Project, and Select.

107
Q

Which type of attack involves hijacking a session between a host and a target by predicting the target’s choice of an initial TCP sequence number?

IP spoofing attack
SYN flood attack
TCP sequence number attack
Smurf attack

A

TCP sequence number attack

A TCP sequence number attack exploits the communication session which was established between the target and the trusted host that initiated the session. It involves hijacking the session between the host and the target by predicting the target’s choice of an initial TCP sequence number. An IP spoofing attack is used to convince a system that it is communication with a known entity that gives an intruder access. It involves modifying the source address of a packet for a trusted source’s address. A SYN attack is when an attacker floods a system with connection requests but does not respond when the target system replies to those requests. A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). The modified packet containing the address of the target system, all devices on its local network respond with a ICMP REPLY to the target system, which is then saturated with those replies.

108
Q

Which ISO/OSI layer establishes the communications link between individual devices over a physical link or channel?

A

Data link layer

The data link layer (layer 2) establishes the communications link between individual devices over a physical link or channel. It also ensures that messages are delivered to the proper device and translates the messages from layers above into bits for the physical layer (layer 1) to transmit.

109
Q

Communications devices must operate:

A

at the same speed to communicate.

Communications devices must operate at the same speed to communicate.

110
Q

What can best be described as a domain of trust that shares a single security policy and single management?

The reference monitor
A security domain
The security kernel
The security perimeter

A

A security domain

A security domain is a domain of trust that shares a single security policy and single management.

The term security domain just builds upon the definition of domain by adding the fact that resources within this logical structure (domain) are working under the same security policy and managed by the same group.

111
Q

Which of the following is NOT a common category/classification of threat to an IT system?

Human
Natural
Technological
Hackers

A

Hackers

Hackers are classified as a human threat and not a classification by itself.

112
Q

Which of the following standard was developed in order to protect against fraud in electronic fund transfers (EFT) by ensuring the packets are coming from its claimed originator and that it has not been altered in transmission?

Secure Electronic Transaction (SET)
Message Authentication Code (MAC)
Cyclic Redundancy Check (CRC)
Secure Hash Standard (SHS

A

Message Authentication Code (MAC)

In order to protect against fraud in electronic fund transfers (EFT), the Message Authentication Code (MAC), ANSI X9.9, was developed. The MAC is a check value, which is derived from the contents of the message itself, that is sensitive to the bit changes in a message. It is similar to a Cyclic Redundancy Check (CRC).

113
Q

What is used to protect programs from all unauthorized modification or executional interference?

A

A protection domain

114
Q

the following can be defined as a framework that supports multiple, optional authentication mechanisms for PPP, including cleartext passwords, challenge-response, and arbitrary dialog sequences?

A

Extensible Authentication Protocol

115
Q

the following is an Internet IPsec protocol to negotiate, establish, modify, and delete security associations, and to exchange key generation and authentication data, independent of the details of any specific key generation technique, key establishment protocol, encryption algorithm, or authentication mechanism?

A

ISAKMP

ISAKMP: It’s not a key exchange protocol per se, it’s a framework on which key exchange protocols operate. ISAKMP is part of IKE. IKE establishs the shared security policy and authenticated keys. ISAKMP is the protocol that specifies the mechanics of the key exchange.

116
Q

How many bits are in the TTL Field of an IP Header?

A

8 for a max TTL of 255

Some other notable IP Header fields and their bits:

  • IP Version = 4
  • IP Header Length = 4
  • TTL = 8, as we saw in this question
  • Source IP Address = 32
  • Destination IP Address = 32
117
Q

Suppose you are an IT Manager at a successful organization and you discover that an employee has been stealing sensitive corporate secrets and he has been fired by the senior executive.

Which Access Control Category would this fall under?

A

Corrective Access Control

In this case, the employee was terminated for data theft and that was the corrective action taken to remedy the situation.

118
Q

How would you BEST prevent data loss by insider mistakes, ensure that data is properly handled, labeled and stored, and overall enhance data security on your network?

A

Ensure you develop an effective user training program advising of these topics

119
Q

This phase tries to understand the source of the attack and point of entry into the network.

A

Analysis and Tracking

Once the incident has been contained, we need to figure out what just happened by putting the available pieces together. This is the stage of analysis, where more data are gathered (audit logs, video captures, human accounts of activities, system activities) to try and figure out the root cause of the incident. The goals are to figure out who did this, how they did it, when they did it, and why. Management must be continually kept abreast of these activities because they will be the ones making the big decisions on how this whole mess is to be handled.

120
Q

IP address from it’s known MAC address

A

RARP
Reverse Arp

MAC address from IP = ARP

121
Q

Which International Organization for Standardization standard is commonly referred to as the Common Criteria?

A

15408

122
Q

Which method of remote access was largely retired by Microsoft because it relies on LANMAN hashes, reuse of session keys and the use of an unauthenticated control channel?

A

PPTP

123
Q

Which of the following biometric system requires LARGEST volume of a storage?

A

Voice Recognition

124
Q

In which phase of Internet Key Exchange (IKE) protocol is peer authentication performed?

A

Phase 1

125
Q

US government and business data sensitivity labeling are different and most business organizations use which of the following levels of classifications:

A

Public,
Internal Use Only,
Confidential,
Restricted

126
Q

Which of the following is the preferred way to suppress an electrical fire in a data center?

A

CO2

127
Q

Calculate symetric keys

A

The general formula to compute the number of keys required for ‘n’ users is n x (n-1) / 2. For 20 users, this works out to 20 x (20-1)/2 = 10 x 19 = 190.