Test Study 5 Flashcards
Detail the responsibilities of the following positions:
CEO CIO CSO CISO CPO
CEO - responsible for overall organization and its mission
CIO - responsible for aligning information and technology strategies
CSO - responsible for physical and technical security of assets
CISO - responsible for monitoring and analyzing risk information associated with data protection
CPO - largely responsible for ensuring that there is compliance with organization and regulatory privacy rules
Who is responsible for overall organization and its mission?
CEO
Who is responsible for aligning information and technology strategies?
CIO
Who is responsible for physical and technical security of assets?
CSO
Who is responsible for monitoring and analyzing risk information associated with data protection?
CISO
Who is responsible for ensuring that there is compliance with organization and regulatory privacy rules?
CPO
What is the GISRA?
Government Information Security Reform Act
Requires federal agencies to perform risk assessments, enact policies, and combines several other previous laws.
What act is related to risk assessment and combines several previous laws?
GISRA
What is FISMA?
Federal Information Security Modernization Act
Handles risk management by the federal government.
Which act deals with risk management in the federal government?
FISMA
What type of control are backups?
Recovery
RAID is fault tolerance, not recovery, which is compensating.
What stage of the risk management framework do you ensure that controls are implemented properly?
Assess
What stage of the risk management framework do you declare the acceptance of risks?
Authorize
What stage of the risk management framework do you perform ongoing assessment of control effectiveness?
Monitor
What is FIPS-198 and what does it provide?
A US Government standard for keyed-HMAC and authentication
What is a US governement protocol standard for authentication?
FIPS-198
At what ring are the drivers present in a computing system?
Ring 0
What are the wifi speeds and ranges?
- 4 - 46m
- 0 - 23m
- 11a = 54
- 11b = 11
- 11g = 54
- 11n = 600
- 11ac = 3466
What protocol and port can be used to load remote operating system?
TFTP, 69
What can TFTP be used for?
Loading a remote operating system.
What are some authentication methods that can be used over non-ethernet networks?
PAP, CHAP, MSCHAP
Which authentication method should be used over non-ethernet networks?
CHAP
What is PAP?
Password Authentication Protocol
Operates in clear text, should not be used, was often used in dial up.
What is CHAP?
Challenge handshake authentication protocol
Uses an encrypted challenge and a three way handshake
What is MS-CHAP?
Microsoft CHAP
Has vulnerabilities because it uses DES
What non-ethernet authentication method operates in clear text?
PAP
What non-ethernet authentication method uses DES?
MS-CHAP
What non-ethernet authentication method uses an encrypted handshake?
CHAP
What is a synchronous token?
Tokens must have a link or synchronized time with the authentication server, classic digital authenticator
What is an asynchronous token?
Tokens that do not have to maintain a timing or link to the authentication server. Often the authentication server issues a challenge that is answered via the user’s asynchronous token.
Which token type is time linked to the server?
Synchronous
Which token type has no timing link to the server?
Asynchronous
What are all of the endpoints that may authenticate in kerberos?
A realm.
What is the name of any endpoint in kerberos?
Principal
What is zzuf?
An application input fuzzer.
What is nikto?
A general purpose web application scanner.
What is 800-53 for?
Catalog of Security Controls
What is 800-53A for?
Assessing security and privacy controls?
What is the difference between 800-53 and 53A?
53 is a catalog of security controls
53A is assessing security and privacy controls
What is the NIST sp for the catalog of security controls.
800-53
What is the NIST sp for assessing security and privacy controls?
800-53A
What is Fagan and what it is it composed of?
Fagan is an inspection process to try to find defects in documents, such as code. Planning Overview Preparation Inspection Meeting Rework Follow Up
What happens in the planning phase of Fagan?
Preparation of matrials
Arranging of participants
Arranging of a meeting place
In what phase of Fagan do you prepare materials and arrange participants?
Planning
What happens in the overview phase of Fagan?
Group education of participants on what is being reviewed
Assignment of roles
In what phase of Fagan do you educate participants about what is being reviewed?
Overview
What happens in the preparation stage of Fagan?
Participants review the items to be inspected an prepare to meet about them.
Participants prepare their roles.
In what phase of Fagan do the participants inspect the supporting material?
Preparation
What happens in the inspection meeting stage of Fagan?
Actual finding of defects
In what phase of Fagan are defects found?
Inspection meeting
What happens in the rework stage of Fagan?
Defects found are corrected
In what stage of Fagan are defects corrected?
Rework
What happens in the follow-up stage of Fagan?
All defects found should have been corrected and the moderator is responsible for verifying this.
In what stage should the moderator verify that defects have been corrected?
Follow-up
What duration of time is a UPS used for?
Minutes to hours
What duration of time is a generator used for?
Hours to days
What power backup should be used from minutes to hours?
UPS
What power backup should be used from hours to days?
Generator
What is a darknet?
An area of the network that should contain no traffic and can be watched for malicious activity.
What is an area of the network that should be watched for malicious activity and shouldn’t contain normal traffic?
Darknet
What is MBSA?
Microsoft Baseline Security Analyzer
A tool for inspecting systems for dangerous settings and missing patches.
What is a product that can analyze Windows computers for dangerous settings and missing patches?
MBSA
What is TCP hijacking?
Stealing session keys
What attack is focused on stealing session keys?
TCP Hijacking
What is RAD?
Rapid application development
Parallel development of mini projects
Makes heavy use of prototyping
Is adaptive.