Security+ Flashcards
Change management is a set of processes that introduce visibility and governance and into the configuration management process.
True
PCI compliance requires that systems serving up credit card information be patched to mitigate exposures resulting from unknown security vulnerabilities.
False
SCADA
SCADA is an acronym for supervisory control and data acquisition, a computer system for gathering and analyzing real time data. SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation.
Collision Resistance is a property such that given two different hash inputs they should not have equal distances.
False hash functions: a hash function H is collision resistant if it is hard to find two inputs that hash to the same output; that is, two inputs a and b such that H(a) = H(b), and a ≠ b. Every hash function with more inputs than outputs will necessarily have collisions.
NERC CIP
The NERC CIP (North American Electric Reliability Corporation critical infrastructure protection) plan is a set of requirements designed to secure the assets required for operating North America’s bulk electric system.
What is a rainbow table?
A rainbow table attack is a type of hacking wherein the perpetrator tries to use a rainbow hash table to crack the passwords stored in a database system. A rainbow table is a hash function used in cryptography for storing important data such as passwords in a database.
Rule Based Access Control and Role Based Access Control are the same.
False
The “___ ____” is a full Bluetooth Pen Testing Suite
Blue Diving
When s-boxes are defined using pairs of characters they are referred to as diagrams.
True In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext — Shannon’s property of confusion.
“_________” data at rest and in motion can additionally enhance the security and confidentiality of data in Big Data systems such as Hadoop and NoSQL based platforms.
Encrypting
“_____ ________” are tools that are commonly used to check system security settings and patch levels.
Vulnerability Scanners
Name a best practice for controlling malware command and control callbacks from leaving your corporate network.
Deploy an authenticated forward proxy.
What is a benefit of placing a honeypot on the untrusted internet side of a company’s DMZ?
Does not utilize FW and IDS resources and if compromised does not create a launch point int the DMZ.
IDS
Intrusion Detections System
IPS
Intrusion Protection System
RSA cryptography strength is a function of ALL of the four key characteristics. 1. Primality. 2. Greatest common divisor. 3. Modular inverse computation 4. Modular powers.
True
Using a “___ ____” is a memory protection technique which a compiler encrypts pointers when stored in memory and decrypting them only when inserted into a CPU’s registers.
Point Guard
Encase is a popular paid forensics case management tool
True EnCase® Forensic is a powerful investigation platform that collects digital data, performs analysis, reports on findings and preserves them in a court validated, forensically sound format.
SAML assertions are secured through the use of digital certificates.
True Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). … SAML enables Single-Sign On (SSO), a term that means users can log in once, and those same credentials can be reused to log into other service providers
“___” filtering can help to ensure that only users with authorized MAC addresses can access a wireless access point.
MAC
The java runtime can allow untrusted “_____” to run in a sandboxed environment to limit its access to the rest of the system.
True
When filling out a CSR what is a CN?
The Common Name (AKA CN) represents the server name protected by the SSL certificate. The certificate is valid only if the request hostname matches the certificate common name. Most web browsers display a warning message when connecting to an address that does not match the common name in the certificate. A CSR or Certificate Signing request is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate. … It also contains the public key that will be included in the certificate. A private key is usually created at the same time that you create the CSR, making a key pair.
“_____” protects DNS servers and clients from attacks such as DNS Spoofing and DNS Cache Poisoning
DNS-SEC DNSSEC strengthens authentication in DNS using digital signatures based on public key cryptography. With DNSSEC, it’s not DNS queries and responses themselves that are cryptographically signed, but rather DNS data itself is signed by the owner of the data.
OCTAVE is a suite of tools, processes and methods used for strategic security assessment and planning.
True