Sec + Finals Flashcards
What is a decentralized open source FIM that does not require specific software to be installed on the desktop?
OpenID
What is using one authentication credential to access multiple accounts or applications
Single Sign On (SSO)
What is using a single authentic credential that is shared across multiple networks
Identity Management
What is Federal Identity Management (FIM)?
When multiple networks are owned by different organizations
Which Single Sign On (SSO) relies on tokens?
OAuth
What is the name given to a wireless technology that uses short range radio frequency transmissions and provides for rapid ad hoc device pairings?
Bluetooth
What is Personal Area Network (PAN)?
Technology designed for data communications over short distances
What are the two types of Bluetooth network topologies?
Piconet and Scatternet
Which Bluetooth topology is it when two Bluetooth devices come within range of each other, they automatically connect with one another?
Piconet
A group of piconets in which connections exists between different piconets is called a?
Scatternet
What are the two Bluetooth attacks?
Bluejacking and bluesnarfing
Which Bluetooth attack is it that sends unsolicited messages to Bluetooth enabled devices but is considered more annoying than normal because no data is stolen?
Bluejacking
Which Bluetooth attack is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?
Bluesnarfing
What are the most common type of Authentication Services?
RADIUS (does not encrypt)
Kerberos (tickets)
TACACS (Unix)
LDAP (big phone book)
Which Authentication service is suitable for what are called “high volume service control expectations” such as dial-in access to a corporate network?
Remote Authentication Dial In User Service (RADIUS)
Which authentication service client is typically a device such as a wireless access point (ap) or dial-up server that is responsible for sending user credentials and connections in the form of a RADIUS message to a RADIUS server?
RADIUS
Which authentication system utilizes a ticket?
Kerberos
Which authentication device is commonly used on Unix devices?
Terminal Access Control Access Control System (TACACS)
Which authentication service is referred to the big phone book since it works as a directory service and sometimes called X.500?
Lightweight Directory Access Protocol (LDAP)
What is the attack that can occur when user input is not properly filtered?
LDAP injection attacks
What is the defense against LDAP injection attacks?
Examine all user input before processing
What are the two categories of symmetric algorithms?
Stream Cipher
Block Cipher
What is stream cipher?
Takes one character and replaces it with another character
What is block cipher?
Manipulates an entire block of plaintext at one time
What are the three protections in information security?
Confidentiality
Integrity
Availability
Ensures that only authorized parties can view the information
Confidentiality
Ensures that the information is correct and no unauthorized person or malicious software has altered the data
Integrity
Ensures that the data is accessible to authorized users
Availability
What are the steps of risk management?
Asset identification Threat identification Vulnerability appraisal Risk assessment Risk mitigation
A standard network device for connection multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment?
Hub
What layer in the OSI model is the hub?
Layer 1
A device that connects network segments
Switch
What layer in the OSI model is the switch
Layer 2
Network device that can forward packets across computer networks
Router
What layer in the OSI model is the router?
Layer 3
Granting or denying approval to use specific resources
Access control
Duties in access control:
Determines the level of security needed for the data and delegates security duties as required
Owner
Duties in access control:
Periodically reviews security settings and maintains records of access by end users
Custodian
Duties in access control:
Follows organizations security guidelines and does not attempt to circumvent security
End user
What are the two basic types of fingerprint scanners?
Static fingerprint scanner
Dynamic fingerprint scanner
What scanner requires the user to place the entire thumb or finger on a small oval window on the scanner?
Static fingerprint scanner
What scanner has a small slit or opening?
Dynamic fingerprint scanner
What has no encryption when voice protocol is used?
IP Telephony
This layer is to send the signal to the network or receive the signal from the network
Layer 1
Physical Layer
The function of this layer involves with encoding and signaling, data transmission, and reception
Later 1
Physical Layer
This layer is responsible for dividing the data into packets; includes error detection and correction
Layer 2
Data Link Layer
The function of this layer performs physical addressing, data framing, error detection, and handling
Layer 2
Data Link Layer
This layer picks the route the packet is to take, and handles the addressing of the packets for delivery
Layer 3
Network Layer
The function of this layer makes logical addressing, routing, fragmentation, and reassembly available
Layer 3
Network Layer
What are the two basic types of Intrusion Detection System (IDS)?
HIDS and NIDS
What intrusion detection system is a software based application that runs on a local host computer that can detect an attack as it occurs?
Host Intrusion Detection System (HIDS)
What intrusion detection system watches for attacks on the network?
Network intrusion detection system
What are the (5) steps for securing the Operating System (OS)?
1) develop the security policy
2) perform host software baselining
3) configure operating system and settings
4) deploy the settings
5) implement patch management
What is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information?
Phishing
What phishing attack automatically redirects the user to the fake site?
Pharming
What phishing attack targets only specific users?
Spear phishing
What phishing attack targets wealthy individuals?
Whaling
What phishing attack uses telephone call instead of emails?
Vishing
What are the three categories of authorization credentials?
1) what a user has (token or card)
2) what a user is (biometrics)
3) what a user knows (passwords)
Computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files
Honeypot
Software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action
Malware
What are the two types of malware that have the primary objective of spreading
Viruses and worms
A malicious computer code that, like it’s biological counterpart, reproduces itself on the same computer
Computer virus
What are the different types of computer viruses?
- program virus
- macro virus
- boot virus
- comparison virus
Malicious program designed to take advantage of a vulnerability in a application or an operating system in order to enter a computer
Worm
An executable program advertised as performing one activity but actually does something else
Trojan horse