Random Questions to remember Flashcards
COOP
Continuous Of Operations Plan
What are the steps in the cyber kill chain
Reconnaissance,
Weaponization,
Delivery,
Exploitation,
Installation,
Command and Control (C2), and
Actions on Objectives.
What is the primary role of the DPO (Data protection Officer)?
The primary role of the data protection officer (DPO) is to ensure that her organization processes the personal data of its staff, customers, providers, or any other individuals (also referred to as data subjects) in compliance with the applicable data protection rules.
They must understand how any privacy information is used within business operations. Therefore, they are the best person for the auditor to interview to get a complete picture of the data usage.
An Auditor may talk to them in regards to understanding how the PII data from a particular database is used within a business.
What is SPI (Sensitive Personal Information)
Sensitive Personal Information (SPI). Sensitive personal information (SPI)
is information about a subject’s opinions, beliefs, and nature afforded specially protected status by privacy legislation. As it cannot be used to identify somebody or make any relevant assertions about health uniquely, it is neither PII nor PHI.
Which Hashing algorithm results in a 160- bit fixed output?
RIPMED - 160 Bits
NTLM - 128
SHA-2 - 256
MD-5 - 128
Methods available to sanitize a hard drive?
Sanitizing a hard drive can be done using Cryptographic erase (CE),
Secure Erase (SE),
Zero-fill, or
Physical destruction.
The cryptographic erase (CE) method sanitizes a self-encrypting drive by erasing the media encryption key and then reimaging the drive.
A secure erase (SE) is used to perform the sanitization of flash-based devices (such as SSDs or USB devices) when cryptographic erase is not available.
The zero-fill method relies on overwriting a storage device by setting all bits to the value of zero (0), but this is not effective on SSDs or hybrid drives, and it takes much longer than the CE method.
“Clear or format” - simple overwriting data once with zeros.
Physical destruction occurs by mechanical shredding, incineration, or degaussing magnetic hard drives.
provide an example of a symmetric cryptographic algorithm
AES - Advanced Encryption Standard is a symmetric-key algorithm for encrypting established as an electronic data encryption standard by NIST in 2001. AES can use a 128-bit key and uses a 128- bit block size
RC4
AES
3DES
DES
Twofish
are all symmetric algorithms.
Which Technology could allow certain users to only use certain ports in the network, but allow other users full access in the same ports?
Network Access Control
Network Access Control (NAC) uses a set of protocols to define and implement a policy that describes how to secure access to network nodes whenever a device initially attempts to access the network. NAC can utilize an automatic remediation process by fixing non-compliant hosts before allowing network access
Provide an example of an asymmetric cryptographic algorithm
PGP - Pretty Good Privacy is an encryption program that provides cryptographic privacy and authentication for data communication.
PGP is used for signing, encrypting, and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications. PGP is a public-key cryptosystem and relies on an asymmetric algorithm.
GPG,
ECC,
DSA
Diffie helman
are all asymmetric algorithms.250410
Which Analysis framework provides a graphical depiction of the attackers approach relative to a kill chain?
The Diamond Model provides an excellent methodology for communicating cyber events and allowing analysts to derive mitigation strategies implicitly.
The Diamond Model is constructed around a graphical representation of an attacker’s behavior. T
What is a FM-200
FM-200 is a fire extinguishing system commonly used in data center. When protecting a data center, think always fire first.
What File Transfer Protocol negotiates a tunnel before the exchange of any commands?
FTPS - FTPES
What Port does DNS Sec use
53 TCP
What port or service is likely used in phone calls, email, banking, shopping
HTTPS 443
What SSL/TLS version supports Secure Hashing Algorithm - SHA-256 Cipher
TLS 1.2, Thats the primary difference between TLS 1.1 and 1.2 - SSL 3.0 is less secure and it does not support SHA 256
Whats a protocol for management and monitoring that supports encryption and have a strong user based authentication
SNMPv3 - older versions send community names in plain text
examples where TLS can provide encrypted communication and where it can’t
Can do: Directory services, File transfer, Web
Can’t - Time synchronization
Names of mode in which the entire network packet is encrypted
Tunnel mode
IPSec Mode in which only the payload is encrypted
Transport mode