Review Topics Flashcards
Review topics that were missed on practice exams or topics that need more practice
a technique used to learn information about a computer system on a network and the services running on its open ports
Banner Grabbing
type of injection in which malicious scripts are injected into otherwise benign and trusted websites
Cross-Site Scripting (XSS)
occurs when the outcome from execution processes is directly dependent on the order and timing of certain events. Those events fail to execute in the order and timing intended by the developer
Race Condition
a symmetric block cipher with a fixed block size of 128 bits. It can utilize a 128-bit, 192-bit, or 256-bit symmetric key
Advanced Encryption Standard (AES)
provides security as a service (SECaaS)
managed security service provider (MSSP)
one of the first public-key cryptosystems and is widely used for secure data transmission. As a public-key cryptosystem, it relies on an asymmetric algorithm
RSA (Rivest–Shamir–Adleman)
an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program
Fuzzing or fuzz testing
modification of DAC that provides a set of organizational roles that users may be assigned to gain access rights
Role-based access control (RBAC)
provides the most detailed and explicit type of access control over a resource because it is capable of making access decisions based on a combination of subject and object attributes, as well as context-sensitive or system-wide attributes
Attribute-based access control (ABAC)
sends specially crafted packets to the target host(s) and then analyzes the responses to determine the open ports and services running on those hosts. Also can determine the versions of the applications being used on those ports and services
Nmap
a command-line utility that displays network connections for incoming and outgoing TCP packets, routing tables, and some network interface and network protocol statistics
Netstat
the process of extracting user names, machine names, network resources, shares, and services from a system
Enumeration
describes how much risk an organization is willing to accept
Risk appetite
a symmetric-key algorithm for encrypting digital data. Although its short key length of 56 bits makes it too insecure for applications, it was the standard used from 1977 until the early 2000s
Data Encryption Standard (DES)
occurs when an attacker sends a ping to a subnet broadcast address and devices reply to spoofed IP (victim server), using up bandwidth and processing power
smurf attack
The access control policy is determined by the owner. Every object in a system must have an owner and each owner determines access rights and permissions for each object
Discretionary Access Control (DAC)
An access control policy where the computer system determines the access control for an object. To access something, you need to meet the minimum level and
have a “need-to-know”
Mandatory Access Control (MAC)
Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label
Rule-based Access Control
Utilizes complex mathematics to create sets of objects and
subjects to define how they interact
Lattice-based Access Control
An access model that is dynamic and context-aware using IF-THEN
statements
Attribute-Based Access Control (ABAC)