Random Test Questions Flashcards

1
Q

Ensuring the integrity of business info is the primary concern of

A

Procedural Security
Procedures are looked at as the lowest level in the policy chain bc they are closest to the computers and provide detailed steps for config and installation issues. they provide the steps to actually implement the statements in the policies, standards and guidelines.. Security procedures, standards, measures and policies cover a number of different subject areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
which one of the following actions should be taken first after a fire has been detected
a. Turn off power to the computers
B. call the fire department 
C. Notify mgmt
D. Evacuate all personnel
A

D. Evacuate all personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a race condition?

A

A Race Condition attack is also known as Time of Check(TOC)/Time of Use(TOU). A race condition is when processes carry out their tasks on a shared resource in an incorrect order. A race condition is possible when two or more processes use a shared resource, as in data within a variable. It is important that the processes carry out their functionality in the correct sequence. If process 2 carried out its task on the data before process 1, the result will be much different than if process1 carried out its tasks on the data before process 2 In software, when the authentication and authorization steps are split into two functions, there is a possibility an attacker could use a race condition to force the authorization step to be completed before the authentication step. This would be a flaw in the software that the attacker has figured out how to exploit.

A race condition occurs when two or more processes use the same resource and the sequences of steps within the software can be carried out in an improper order, something that can drastically affect the output. So, an attacker can force the authorization step to take place before the authentication step and gain unauthorized access to a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets correspond most closely to which of the following?
A. publickeys
B. privatekeys
C. public-keycertificates 
D. private-keycertificates
A

Public-key certificates

A Kerberos ticket is issued by a trusted third party. It is an encrypted data structure that includes the service encryption key. In that sense it is similar to a public-key certificate. However, the ticket is not the key.

The following answers are incorrect:
public keys. Kerberos tickets are not shared out publicly, so they are not like a PKI public key.
private keys.

Although a Kerberos ticket is not shared publicly, it is not a private key. Private keys are associated with Asymmetric crypto system which is not used by Kerberos. Kerberos uses only the Symmetric crypto system.
private key certificates. This is a detractor. There is no such thing as a private key certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
n which of the following security models is the subject's clearance compared to the object's classification such that specific rules can be applied to control how the subject-to-object interactions take place?
A. Bell-LaPadulamodel 
B. Bibamodel
C. Access Matrix model 
D. Take-Grant model
A

A security model maps the abstract goals of the policy to information system terms by specifying explicit data structures and techniques necessary to enforce the security policy. A security model is usually represented in mathematics and analytical ideas, which are mapped to system specifications and then developed by programmers through programming code. So we have a policy that encompasses security goals, such as “each subject must be authenticated and authorized before accessing an object.” The security model takes this requirement and provides the necessary mathematical formulas, relationships, and logic structure to be followed to accomplish this goal.

A system that employs the Bell-LaPadula model is called a multilevel security system because users with different clearances use the system, and the system processes data at different classification levels. The level at which information is classified determines the handling procedures that should be used. The Bell- LaPadula model is a state machine model that enforces the confidentiality aspects of access control. A matrix and security levels are used to determine if subjects can access different objects. The subject’s clearance is compared to the object’s classification and then specific rules are applied to control how subject-to-object subject-to-object interactions can take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support?
A. SESAME
B. RADIUS
C. KryptoKnight 
D. TACACS+
A

Secure European System for Applications in a Multi-vendor Environment (SESAME) was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Single Sign-on (SSO) is characterized by which of the following advantages?
A. Convenience
B. Convenienceandcentralizedadministration
C. Convenience and centralized data administration
D. Convenience and centralized network administration

A

Convenience -Using single sign-on users have to type their passwords only once when they first log in to access all the network resources; and Centralized Administration as some single sign-on systems are built around a unified server administration system. This allows a single administrator to add and delete accounts across the entire network from one user interface.

The following answers are incorrect:
Convenience - alone this is not the correct answer.
Centralized Data or Network Administration - these are thrown in to mislead the student. Neither are a benefit to SSO, as these specifically should not be allowed with just an SSO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary role of smartcards in a PKI?
A. Transparent renewal of user keys
B. Easy distribution of the certificates between the users
C. Fast hardware encryption of the raw data
D. Tamper resistant, mobile storage and application of private keys of the users

A

D. Tamper resistant, mobile storage and application of private keys of the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What kind of certificate is used to validate a user identity?
A. Publickeycertificate
B. Attributecertificate
C. Root certificate
D. Code signing certificate
A

In a typical public key infrastructure (PKI) scheme, the signature will be of a certificate authority (CA). In a web of trust scheme, the signature is of either the user (a self-signed certificate) or other users (“endorsements”). In either case, the signatures on a certificate are attestations by the certificate signer that the identity information and the public key belong together.

In computer security, an authorization certificate (also known as an attribute certificate) is a digital document that describes a written permission from the issuer to use a service or a resource that the issuer controls or has access to use. The permission can be delegated.
Some people constantly confuse PKCs and ACs. An analogy may make the distinction clear.

A PKC can be considered to be like a passport: it identifies the holder, tends to last for a long time, and should not be trivial to obtain. An AC is more like an entry visa: it is typically issued by a different authority and does not last for as long a time. As acquiring an entry visa typically requires presenting a passport, getting a visa can be a simpler process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:
A. data acquisition process 
B. cost
C. enrollment process
D. speed and user interface
A

Cost is a factor when considering Biometrics but it is not a security characteristic.
All the other answers are incorrect because they are security characteristics related to Biometrics.
Data acquisition process can cause a security concern because if the process is not fast and efficient it can discourage individuals from using the process.

Enrollment process can cause a security concern because the enrollment process has to be quick and efficient. This process captures data for authentication.
Speed and user interface can cause a security concern because this also impacts the users acceptance rate of biometrics. If they are not comfortable with the interface and speed they might sabotage the devices or otherwise attempt to circumvent them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rule-Based Access Control (RuBAC) access is determined by rules. Such rules would fit within what category of access control?
A. DiscretionaryAccessControl(DAC)
B. Mandatory Access control(MAC)
C. Non-Discretionary Access Control (NDAC)
D. Lattice-based Access control

A

C. Non-Discretionary Access Control (NDAC)

Rule-based access control is a type of non-discretionary access control because this access is determined by rules and the subject does not decide what those rules will be, the rules are uniformly applied to ALL of the users or subjects.
In general, all access control policies other than DAC are grouped in the category of non-discretionary access control (NDAC).

As the name implies, policies in this category have rules that are not established at the discretion of the user. Non-discretionary policies establish controls that cannot be changed by users, but only through administrative action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC = Mandatory Access Control

A

MAC = Mandatory Access Control
Under a mandatory access control environment, the system or security administrator will define what permissions subjects have on objects. The administrator does not dictate user’s access but simply configure the proper level of access as dictated by the Data Owner.

The MAC system will look at the Security Clearance of the subject and compare it with the object sensitivity level or classification level. This is what is called the dominance relationship.

The subject must DOMINATE the object sensitivity level. Which means that the subject must have a security clearance equal or higher than the object he is attempting to access.
MAC also introduce the concept of labels. Every objects will have a label attached to them indicating the classification of the object as well as categories that are used to impose the need to know (NTK) principle. Even thou a user has a security clearance of Secret it does not mean he would be able to access any Secret documents within the system.

He would be allowed to access only Secret document for which he has a Need To Know, formal approval, and object where the user belong to one of the categories attached to the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discretionary Access Control DAC

A

DAC is also known as: Identity Based access control system. The owner of an object is define as the person who created the object. As such the owner has the discretion to grant access to other users on the network. Access will be granted based solely on the identity of those users.
Such system is good for low level of security. One of the major problem is the fact that a user who has access to someone’s else file can further share the file with other users without the knowledge or permission of the owner of the file. Very quickly this could become the wild west as there is no control on the dissemination of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The type of discretionary access control (DAC) that is based on an individual's identity is also called:
A. Identity-based Access control
B. Rule-based Access control
C. Non-Discretionary Access Control 
D. Lattice-based Access control
A

An identity-based access control is a type of Discretionary Access Control (DAC) that is based on an individual’s identity. DAC is good for low level security environment. The owner of the file decides who has access to the file.
If a user creates a file, he is the owner of that file. An identifier for this user is placed in the file header and/or in an access control matrix within the operating system.
Ownership might also be granted to a specific individual. For example, a manager for a certain department might be made the owner of the files and resources within her department.

A system that uses discretionary access control (DAC) enables the owner of the resource to specify which subjects can access specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following control pairings include: organizational policies and procedures, pre- employment background checks, strict hiring practices, employment agreements, employee termination procedures, vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training, behavior awareness, and sign-up procedures to obtain access to information systems and networks?
A. Preventive/Administrative Pairing
B. Preventive/T echnical Pairing
C. Preventive/Physical Pairing
D. Detective/Administrative Pairing
A

organizational policies and procedures, pre-employment background checks, strict hiring practices, employment agreements, friendly and unfriendly employee termination procedures, vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training, behavior awareness, and sign-up procedures to obtain access to information systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/ software units. Such controls, also known as logical controls, represent which pairing?
A. Preventive/Administrative Pairing
B. Preventive/Technical Pairing
C. Preventive/Physical Pairing
D. Detective/Technical Pairing
A

B. Preventive/Technical Pairing
Preventive/Technical controls are also known as logical controls and can be built into the operating system, be software applications, or can be supplemental hardware/software units.

17
Q
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
A. Sendback systems
B. Callback forward systems 
C. Callback systems
D. Sendback forward systems
A

Call back Systems; Callback systems provide access protection by calling back the number of a previously authorized location, but this control can be compromised by call forwarding

18
Q
What are called user interfaces that limit the functions that can be selected by a user?
A. Constrained user interfaces 
B. Limited user interfaces
C. Mini user interfaces
D. Unlimited user interfaces
A

A. Constrained user interfaces
Another method for controlling access is by restricting users to specific functions based on their role in the system. This is typically implemented by limiting available menus, data views, encryption, or by physically constraining the user interfaces.

19
Q
Controls such as job rotation, the sharing of responsibilities, and reviews of audit records are associated with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
A

D. Detective/administrative
Additional detective/administrative controls are job rotation, the sharing of responsibilities, and reviews of audit records.

20
Q
The control measures that are intended to reveal the violations of security policy using software and hardware are associated with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
A

B. Detective/technical

The detective/technical control measures are intended to reveal the violations of security policy using technical means.

21
Q

External consistency ensures that the data stored in the database is:
A. in-consistentwiththerealworld.
B. remains consistent when sent from one system to another.
C. consistent with the logical world.
D. consistent with the real world.

A

D. consistent with the real world.

External consistency ensures that the data stored in the database is consistent with the real world

22
Q
A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:
A. MandatoryAccessControl
B. DiscretionaryAccessControl
C. Non-Discretionary Access Control 
D. Rule-based Access control
A

A central authority determines what subjects can have access to certain objects based on the organizational security policy.

The key focal point of this question is the ‘central authority’ that determines access rights.
Cecilia one of the quiz user has sent me feedback informing me that NIST defines MAC as: “MAC Policy means that Access Control Policy Decisions are made by a CENTRAL AUTHORITY.

Which seems to indicate there could be two good answers to this question.

23
Q
What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
A. Authentication 
B. Identification 
C. Authorization 
D. Confidentiality
A

Identification is the act of a user professing an identity to a system, usually in the form of a log-on ID to the system.

Identification is nothing more than claiming you are somebody. You identify yourself when you speak to someone on the phone that you don’t know, and they ask you who they’re speaking to. When you say, “I’m Jason.”, you’ve just identified yourself.

24
Q

Which one of the following factors is NOT one on which Authentication is based?
A. Type 1 Something you know, such as a PIN or password
B. Type 2 Something you have, such as an ATM card or smart card
C. Type 3 Something you are (based upon one or more intrinsic physical or behavioral traits), such as a fingerprint or retina scan
D. Type 4 Something you are, such as a system administrator or security administrator

A

Authentication is based on the following three factor types:
Type 1 Something you know, such as a PIN or password
Type 2 Something you have, such as an ATM card or smart card
Type 3 Something you are (Unique physical characteristic), such as a fingerprint or retina scan

25
Q
Which type of password provides maximum security because a new password is required for each new log-on?
A. One-time or dynamic password
 B. Congnitivepassword
C. Static password
D. Passphrase
A

“One-time password” provides maximum security because a new password is required for each new log-on

26
Q

Why are macro viruses easy to write?
A. Active content controls can make direct system calls
B. The underlying language is simple and intuitive to apply
C. Only a few assembler instructions are needed to do damage
D. Office template are fully API compliant

A

Macro language enables programmers to edit, delete, and copy files. because these languages are so easy to use, many more types of macro viruses are possible

27
Q
Tracing violations, or attempting violations of systems security to the user responsible is a function of 
A. Authentication
B. Access management
C. Integrity 
D. accountability
A

Auditing capabilities ensure that users are accountable for their actions, verify that the security policies are enforced, worked as a deterrent to improper actions, and are used as investigation tools

28
Q
Which one of the following is concerned with masking the frequency, length and origin-destination patterns of the communications between protocol entities?
A. Masking analysis
B. Protocol Analysis
C. Traffic Analysis
D. Pattern Analysis
A

Traffic analysis, which is sometimes called trend analysis, is a technique employed by an intruder that involves analyzing data characteristics (message length, message frequency etc) and the patterns of transmissions (rather than any knowledge of the of the actual information transmitted) to infer information that is useful to an intruder

29
Q

In which situation would TEMPEST risks and technologies be of MOST interest?
A. Where high availability is vital
B. Where the consequences of disclosure are very high
C. where countermeasure are easy to implement
D. where data integrity is crucial

A

Emmanation eavesdropping. Receipt and display of information, this is resident on computers or terminals, through the interception of radio frequency (RF) signals generated by those computers or terminals. US gov established a program called TEMPEST that addressed this problem by requiring a shielding and other emanation-reducing mechanisms to be employed on computers processing sensitive and classified gov info.

30
Q
In which state must a computer system operate to process input/output instructions?
A. user mode
B. Stateful inspection
C. Interprocess communication
D. Supervisor mode
A

A computer is in a supervisory state when it is executing these privileged (input/output instructions).

31
Q

All of the following are basic components of a security policy except the
A. Definition of the issue and statement of relevant terms
B. Statement of roles and responsibilities
C. Statement of applicability and compliance requirements
D. statement of performance of characteristics and requirements

A

D. Statement of performance of characteristics and requirements

Policies are considered the first and highest level of documentation, from which the lower level elements of standards, procedures and guidelines flow. this order does not mean that polices are more important than the lower elements. these higher level policies, which are more general statements, should be created first in the process for strategic reasons and then the more tactical elements can follow

32
Q

What set of principles is the basis for information systems controls
A. Authentication, audit trails, and awareness briefings
B. Individual accountability, auditing, and separation of duties
C. Need to know, identification and authenticity
D. Audit trails, limited tenure, and awareness briefings

A

In addition to CIA Triad, there is a plethora of other security related concepts, principles and tenants that should be addressed when designing a security policy and deploying a security solution.

33
Q

Which one of the following is NOT a requirement before a search warrant can be issued?
A. there is a probable cause that a crime has been committed
B. there is an expectation that evidence exists of the crime
C. there is probalble cause to enter someone’s home or business
D. there is a written document detailing the anticipated evidence

A

Search warrants are issued when there is a probably cause for the search and provide legal authorization to search a location for specific evidence

34
Q

The Trusted Computer Security Evaluation Criteria (TCSEC) provides
A. a basis for assessing the effective of security controls built into automatic data processing system products
B. a system analysis and penetration technique where specification and document for the system are analyzed
C. a formal static transition model of computer security policy that describes a set of access control rules
D. a means of restricting access to objects based on the identify of subjects and groups to which they belong

A

TCSEC provides guidelines to be used with evaluating a security product. The TCSEC guidelines address basic security functionality and allow evaluator to measure and rate the functionality of a system and how trustworthy it is. Functionality and assurance are combined and not separated as in criteria developed later. TCSEC guidelines can be used for evaluating vendor products or by vendors to design necessary functionality into new products

35
Q
Which factor is critical in all systems to protect data integrity?
A. Data Classification
B. Information ownership
C. Change control
D. System design
A

A. Data Classification
Integrity is dependent on confidentiality, which relies on data classification.

Without object integrity, confidentiality cannot be maintained.

36
Q

What are countermeasures to protect against the loss of confidentiality?

A

There are numerous countermeasures to ensure confidentiality against possible threats. those include the use of encryption, network traffic padding, strict access control, rigorous authentication procedures, data classification and extensive personnel training.

37
Q

List concepts, conditions and aspects of confidentiality

A

other concepts, conditions and aspects of confidentiality include sensitive, discretion, critical, concealment, secrecy, privacy, seclusion and isolation

38
Q

What are 3 goals of integrity?

A

Integrity is usually characterized by the 3 following goals
1. the data is protect from modification by unauthorized users
the data is protect from unauthorized modification by authorized users
the data in internally and externally consistent; the data held in a database must balance internally and correspond to the external, real world situation

39
Q
Audit trails based upon access and identification codes establish
A. instruction detection thresholds
B. individual accountability
C. audit review criteria 
D. Individual authentication
A

Accountability is another facet of access control. individuals on a system are reasonable for their actions. this accountability property enables system activities to be traced to the proper individuals. Accountability is supported by audit trails that record events on the system and on the network. Audit trails can be used for intrusion detection and for the reconstruction of past events