Test Study 5 Flashcards

1
Q

Detail the responsibilities of the following positions:

CEO
CIO
CSO
CISO
CPO
A

CEO - responsible for overall organization and its mission
CIO - responsible for aligning information and technology strategies
CSO - responsible for physical and technical security of assets
CISO - responsible for monitoring and analyzing risk information associated with data protection
CPO - largely responsible for ensuring that there is compliance with organization and regulatory privacy rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is responsible for overall organization and its mission?

A

CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is responsible for aligning information and technology strategies?

A

CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is responsible for physical and technical security of assets?

A

CSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is responsible for monitoring and analyzing risk information associated with data protection?

A

CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is responsible for ensuring that there is compliance with organization and regulatory privacy rules?

A

CPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the GISRA?

A

Government Information Security Reform Act

Requires federal agencies to perform risk assessments, enact policies, and combines several other previous laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What act is related to risk assessment and combines several previous laws?

A

GISRA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is FISMA?

A

Federal Information Security Modernization Act

Handles risk management by the federal government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which act deals with risk management in the federal government?

A

FISMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of control are backups?

A

Recovery

RAID is fault tolerance, not recovery, which is compensating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What stage of the risk management framework do you ensure that controls are implemented properly?

A

Assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What stage of the risk management framework do you declare the acceptance of risks?

A

Authorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What stage of the risk management framework do you perform ongoing assessment of control effectiveness?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is FIPS-198 and what does it provide?

A

A US Government standard for keyed-HMAC and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a US governement protocol standard for authentication?

A

FIPS-198

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

At what ring are the drivers present in a computing system?

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the wifi speeds and ranges?

A
  1. 4 - 46m
  2. 0 - 23m
  3. 11a = 54
  4. 11b = 11
  5. 11g = 54
  6. 11n = 600
  7. 11ac = 3466
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What protocol and port can be used to load remote operating system?

A

TFTP, 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What can TFTP be used for?

A

Loading a remote operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some authentication methods that can be used over non-ethernet networks?

A

PAP, CHAP, MSCHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which authentication method should be used over non-ethernet networks?

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is PAP?

A

Password Authentication Protocol

Operates in clear text, should not be used, was often used in dial up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is CHAP?

A

Challenge handshake authentication protocol

Uses an encrypted challenge and a three way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is MS-CHAP?
Microsoft CHAP | Has vulnerabilities because it uses DES
26
What non-ethernet authentication method operates in clear text?
PAP
27
What non-ethernet authentication method uses DES?
MS-CHAP
28
What non-ethernet authentication method uses an encrypted handshake?
CHAP
29
What is a synchronous token?
Tokens must have a link or synchronized time with the authentication server, classic digital authenticator
30
What is an asynchronous token?
Tokens that do not have to maintain a timing or link to the authentication server. Often the authentication server issues a challenge that is answered via the user's asynchronous token.
31
Which token type is time linked to the server?
Synchronous
32
Which token type has no timing link to the server?
Asynchronous
33
What are all of the endpoints that may authenticate in kerberos?
A realm.
34
What is the name of any endpoint in kerberos?
Principal
35
What is zzuf?
An application input fuzzer.
36
What is nikto?
A general purpose web application scanner.
37
What is 800-53 for?
Catalog of Security Controls
38
What is 800-53A for?
Assessing security and privacy controls?
39
What is the difference between 800-53 and 53A?
53 is a catalog of security controls | 53A is assessing security and privacy controls
40
What is the NIST sp for the catalog of security controls.
800-53
41
What is the NIST sp for assessing security and privacy controls?
800-53A
42
What is Fagan and what it is it composed of?
``` Fagan is an inspection process to try to find defects in documents, such as code. Planning Overview Preparation Inspection Meeting Rework Follow Up ```
43
What happens in the planning phase of Fagan?
Preparation of matrials Arranging of participants Arranging of a meeting place
44
In what phase of Fagan do you prepare materials and arrange participants?
Planning
45
What happens in the overview phase of Fagan?
Group education of participants on what is being reviewed | Assignment of roles
46
In what phase of Fagan do you educate participants about what is being reviewed?
Overview
47
What happens in the preparation stage of Fagan?
Participants review the items to be inspected an prepare to meet about them. Participants prepare their roles.
48
In what phase of Fagan do the participants inspect the supporting material?
Preparation
49
What happens in the inspection meeting stage of Fagan?
Actual finding of defects
50
In what phase of Fagan are defects found?
Inspection meeting
51
What happens in the rework stage of Fagan?
Defects found are corrected
52
In what stage of Fagan are defects corrected?
Rework
53
What happens in the follow-up stage of Fagan?
All defects found should have been corrected and the moderator is responsible for verifying this.
54
In what stage should the moderator verify that defects have been corrected?
Follow-up
55
What duration of time is a UPS used for?
Minutes to hours
56
What duration of time is a generator used for?
Hours to days
57
What power backup should be used from minutes to hours?
UPS
58
What power backup should be used from hours to days?
Generator
59
What is a darknet?
An area of the network that should contain no traffic and can be watched for malicious activity.
60
What is an area of the network that should be watched for malicious activity and shouldn't contain normal traffic?
Darknet
61
What is MBSA?
Microsoft Baseline Security Analyzer | A tool for inspecting systems for dangerous settings and missing patches.
62
What is a product that can analyze Windows computers for dangerous settings and missing patches?
MBSA
63
What is TCP hijacking?
Stealing session keys
64
What attack is focused on stealing session keys?
TCP Hijacking
65
What is RAD?
Rapid application development Parallel development of mini projects Makes heavy use of prototyping Is adaptive.