study 4 Flashcards

1
Q

Refers to attack and control circumvention attempts on a target’s network perimeter from outside the target’s system, usually the Internet

A

External Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to attack and control circumvention attempt on target from within the perimeter. The objective is to identify what would occur if the external perimeter was successfully compromised and/or an authorized user from within the network wanted to compromise security of a specific resource on a network.

A

Internal Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to the condition of testing when the penetration tester is provided with limited or no knowledge of the target’s information systems. Such testing is expensive, since penetration tester have to research the target and profile it based on publicly available information.

A

Blind Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is a extension of blind testing, since the administrator and security staff at the target are also not aware of test. Such a testing can effectively evaluate the incident handling and response capability of the target and how well managed the environment is.

A

Double Blind Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to attack and control circumvention attempts on the target, while both the target’s IT team and penetration tester are aware of the testing activities. Penetration testers are provided with information related to target and network design. Additionally, they are also provided with a limited privilege user account to be used as a starting point to identify privilege escalation possibilities in the system.

A

Targeted Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Personnel who review result and deliverables within each phase and at the end of each phase, and confirm compliance with requirements. Their objective is to ensure that the quality of the project by measuring adherence of the project staff to the organization’s software development life cycle (SDLC), advise on the deviation and propose recommendation for process improvement or greater control points when deviation occur.

A

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensures that system controls and supporting processes provides an effective level of protection, based on the data classification set in accordance with corporate security policies and procedures: consult throughout the life cycle on appropriate security measures that should be incorporated into the system.

A

Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Completes assigned tasks, communicate effectively with the system developers by actively involving themselves in the development process as Subject Matter Expert (SME) and works according to local standards, and advise the project manager of expected and actual project deviations.

A

User Project Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Completes assigned tasks, communicates effectively with user by actively involving them in the development process, works according to local standards, and advise the project manager of necessary plan deviations.

A

System Development Project Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Project sponsor provides funding for the project and works closely with the project manager to define critical success factor(CSFs) and metrics for measuring the success of the project. It is crucial that success is translated to measurable and quantifiable terms. Data and application ownership are assigned to a project sponsor. A project sponsor is typically the senior manager in charge of the primary business unit that the application will support.

A

Project Sponsor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides day-to-day management and leadership of the project, ensures that project activities remain in line with the overall directions, ensures appropriate representation of the affected departments, ensures that the project adheres local standards, ensures that deliverable meet the quality expectation of key stakeholder, resolve interdepartmental conflict, and monitors and controls cost of the project timetables.

A

Project Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provides technical support for hardware and software environment by developing, installing and operating the requested system.

A

System Development Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides overall directions and ensures appropriate representation of the major stakeholders in the project’s outcome. The project steering committee is ultimately responsible for all deliverables, project costs and schedules. This committee should be compromised of senior representative from each business area that will be significantly impacted by the proposed new system or system modifications.

A

Project Steering Committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Demonstrate commitment to the project and approves the necessary resources to complete the project. This commitment from senior management helps ensure involvement by those needed to complete the project.

A

Senior Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assumes ownership of the project and resulting system, allocates qualified representatives to the team, and actively participates in business process redesign, system requirement definitions, test case development, acceptance testing and user training.

A

User Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A certificate is a digital document that at a minimum includes what?

A
  1. a Distinguished Name (DN)

2. an associated public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is used to match an IP address to an Ethernet address so the packet can be sent to the appropriate node.

A

The Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is used to match an Ethernet address to an IP address

A

Reverse address resolution protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

L2TP Protocol works at what layer?

A

data link layer

20
Q

Secure Sockets Layer (SSL): Works at what layer?

A

transport layer

21
Q

IPSec: Works at what layer?

A

network layer, and provides security on top of IP

22
Q

Point-to-Point Tunneling Protocol (PPTP) Works at what layer?

A

data link layer

23
Q

What protection devices is used for spot protection within a few inches of the object,

A

Capacitance detectors

24
Q

is the act of gathering the necessary information so the best decision-making activities can take place.

A

Due Diligence

25
Q

a gateway act as a ? Device

A

translation device

It could be used to translate from IPX to TCP/IP

26
Q

A bridge work at what layer

A

at the data link layer

27
Q

token ring IEEE #

A

802.5

28
Q

IEEE 802.2 refers to what?

A

the logical link control

29
Q

IEEE 802.11 refers to what?

A

wireless communications

30
Q

IEEE 802.3 refers to what?

A

Ethernet’s CSMA/CD

31
Q

is used to send encrypted information using symmetric keys, and the relevant session key along with it. It is a secure method to send electronic document without compromising the data integrity,

A

Digital Envelope

32
Q

he most common method of session hijacking is called

A

P spoofing

33
Q

a computer with a ? firewall would respond to ACK packets sent to port TCP/80 when the port should not respond to unsolicited ACK packets for a non-existent TCP session.

A

stateless firewall

34
Q

From most effective (lowest CER) to least effective (highest CER) are? (4)

A
  1. Iris scan,
  2. fingerprint,
  3. voice verification
  4. keystroke dynamics
35
Q

a hamming code is used to create

A

parity information?

36
Q

confirms that users’ needs have been met by the supplied solution.

A

Acceptance

37
Q

is the formal testing of security safeguards and assurance is the degree of confidence that the implemented security measures work as intended.

A

Certification

38
Q

Once an intrusion into your organization’s information system has been detected, the first action that needs to be performed

A

Determine to what extent systems and data may be compromised.

39
Q

using mathematical properties of modular arithmetic and a method known as

A

Computing in Galois fields

40
Q

In which phase of the System Development Lifecycle (SDLC) is Security Accreditation Obtained?

A

Testing and evaluation control

41
Q

n which phase of the System Development Lifecycle (SDLC) is implementation

A

Transition to production

42
Q

decision support system (DSS) is know as

A

Delphi Method or Delphi Technique:

43
Q

The main purpose of off-site hardware testing to ensure What?

A

The continued compatibility of the contingency facilities.

44
Q

provides protection against sniffing and replay attacks but also provides message authentication and integrity.

A

SRTP - Secure Real-time Transport Protocol

45
Q

SRTP uses what as the default cipher.

A

AES - Advanced Encryption Standard

46
Q

is used on the Local Area Network (LAN) to obtain an IP address from it’s known MAC address?

A

is used on the Local Area Network (LAN) to obtain an IP address from it’s known MAC address?