Test Study 4 Flashcards
What is Type 2 XSS?
Persistent
Malicious scripts that are submitted and stored on the server to be presented to other users.
What works on port 25?
SMTP
What has an IP header of 51?
AH
What are the key concepts of Common Criteria?
Target of Evaluation Protection Profile Security Functionality Requirements Security Assurance Requirements Evaluation Assurance Level
What operates on port 515?
CUP
What is the trusted path?
A secure channel for system management activities to prevent imitation.
What is PRI in networking?
Primary Rate Interface ISDN, consists of 24 x 64 kb/s channels for a total of 1.544 Mb/s
Also known as T1 or E1
Which standard certificate format is used most often by CAs?
PEM
What port does SNMP work on?
161
What packet has an IP header of 1?
ICMP
What ISDN can provide speeds of at least 30 Mb/s?
E-3, T-3
What part of the TCB is responsible for handling user access requests?
Security kernel.
What happens in the analyze step of continuous monitoring?
Analyze the data collected and report the findings and determine the appropriate response.
What is the IP header for ESP?
50
What RMF step includes reporting findings and determining the appropriate response?
Analyze and Report
What framework will provide an indication of maturity of security controls?
COBIT
What operates on port 67/68
BootP / DHCP
What happens in the review and update step of continuous monitoring?
Review and update the monitoring program, adjusting the strategy and maturing measurement capabilities to increase visibility into assets and awareness of vulnerabilities.
What is the IP header for ICMP?
1
What port does SMTP work on?
25
What happens in the establish step of continuous monitoring?
Determine metrics, status monitoring frequencies, control assessment frequencies, and technical architecture.
What provides digital network over voice cabling?
ISDN
What encryption method replaces characters based on a fixed number of positions away?
Shift cipher
What RMF step includes collecting security related information required for metrics?
Implement
What are the wireless standards that can operate at 5 ghz?
- 11a
- 11ac
- 11n
What are the speeds of T-1, T-3, E-1, and E-3?
T-1 is 1.544 Mb/s
T-3 is 45 Mb/s
E-1 is 2.048 Mb/s
E-3 is 34.368 Mb/s
What works on port 143?
IMAP
What is a capability table?
A list of subjects that are authorized to access a specific object.
What is PASTA?
Process for attack simulation and threat analysis
It’s a seven step risk oriented threat assessment methodology.
What is the difference in S/MIME and PGP?
PGP relies on web of trust, S/MIME requires PKI
What protocol can apply encryption and digital signatures to email, and is compatible with a wide range of key management approaches?
MOSS
What happens in the respond step of continuous monitoring?
Respond to findings with technical, management, and operational mitigating activities or acceptance, transference, or avoidance.
What are the wireless standards and their ranges?
5ghz 802.11a 802.11ac 2.5ghz 802.11b 802.11g Both 802.11n
What is an ephemeral key?
a key generated based on all new parameters and randomized.
What is a secure channel for system management?
Trusted Path
What is the reference monitor?
An abstract machine that is used to validate access to objects by authorized subjects. It operates at the boundary between the trusted and untrusted realm.
What is BR in networking?
Basic Rate ISDN, it consists of 2 x 64kb/s channels for a total of 128 kb/s
What are the key principals of GDPR?
Lawfulness, fairness and transparency. Purpose limitation. Data minimization. Accuracy. Storage limitation. Integrity and confidentiality (security) Accountability.
What is a statement of importance?
A document derived from the BIA which is relevant to continuity plans.
What is OCSP stapling?
The presenter of a certificate bears the resource cost involved in providing OCSP responses by appending a time-stamped OCSP response signed by the CA to the initial TLS handshake.
What works on port 110?
POP
What is a tunneling protocol that works at the network layer that cannot handle its own encryption?
GRE
Generic Routing Encapsulation
What is material evidence?
Evidence that bears a significant relationship to the facts of the case.
What is S/MIME?
Secure Multi Purpose Internet Mail Extentions
A protocol for sending digitally signed or encrypted email.
What operates on port 2049?
NFS
What are AH, UDP, ESP in long form?
Authentication Header
User Datagram Protocol
Encapsulation Security Protocol