Test Study 6 Flashcards
What is the ISC2 code of ethics?
Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly , responsibly, and legally.
Provide diligent and competent service to principals.
Advance and protect the profession.
What data state (in flight, at rest, etc) does SQLi affect?
Data in use
What is SED?
Self-encrypting drives, primarily usb storage with automatic encryption.
What is RTOS?
Real time operating system
Used in high speed robotics and manufacturing.
What type of system should be used for robotics or manufacturing?
RTOS / Real time operating system
What is type 1 virtualization?
Bare metal hypervisors, runs directly on the physical hardware of a host machine and doesn’t require an underlying operating system to load. Most efficient
What is type 2 virtualization?
Hosted, runs on a host OS, it relies on the OS it is installed on for certain operations. Supports a wide range of hardware.
Which type of virtualization doesn’t require a host operating system?
Type 1 / Bare Metal
Which type of virtualization relies on other portions of the system to handle things like CPU calls and network resources?
Type 2 / Hosted
What is a SAN certificate?
Subject Alternative Name
Allows a single certificate to possess and authenticate multiple names. Can handle multiple top level and sub domains, but requires explicitness.
What is a wildcard certificate?
A certificate to secure multiple subdomains. Doesn’t require an explicit list.
Which type of domain certificate is good for multiple uses where you may add new subdomains repeatedly?
Wildcard
Which type of domain certificate should be used for multiple domains where you have a complete list of domains it should be used for?
SAN / Subject Alternate Name
List and detail the certificate formats.
PEM, DER, PFX, CER, P12, P7B
PEM - most common format for CAs, contains any or all of the whole cert chain and keys, widely used by Unix, base 64 encoded ascii files, extensions such as .pem, .crt, .cer, .key, apache uses PEM
DER - binary form of a PEM key, storage of a single cert without private key or the chain, .cer and .der, typically used by Java
PFX, PKCS12, P12 - interchangeable, for storing a server or intermediate cert along with private key in one encrypted file
P7B / PKCS7 - contains certificates and chains, but not the private key, has extension .p7b, .p7c, used by several platforms.
Which is the most common certificate format issued by CAs?
PEM
What are the properties and makeup of a PEM file?
Base 64 encoded ascii file, can contain any or all of the cert, chain, and keys, typically uses .pem, .crt, .cer, .key, often used in Apache.
What are the properties and makeup of a DER file?
Binary form of PEM, .cer or .der extensions, typically used in Java.
What certificate format is typically used in Java?
DER
What are the properties and makeup of a PFX key?
PFX, PKCS12, P12
Use for storing the server and intermediate certificates and the private key in one encrypted file.
.pfx, .p12, typically used in Windows
Which certificate format is encrypted and stores the certificates and private key in one file?
PFX / PKCS12 / P12
What are the properties and makeup of a P7B file?
P7B/PKCS7
Base 64 encoded, can contain certificates and chain, but NOT private key
.p7b, .p7c
Supported by several platforms - Windows, Java, Tomcat
Which certificate format is base 64 encoded and contains the certificates and chains in one file, but not the private key?
P7B / PKCS7
Which certificate format is base 64 encoded and contains the certificates, chains, and private key in one file?
PEM
Which certificate format is supported by several platforms such as Windows, Java, and Tomcat?
P7B / PKCS7
What are some properties of transport mode vpn?
Point to point or end to end encryption
The IP payload is protected
What are some properties of tunnel encryption?
Uses ESP & AH
Tunnel between two network devices, or site to site
IP payload AND header are protected, entire IP packet becomes a payload of a new IP packet and header
Which vpn mode should be used for end to end encryption?
Transport
Which vpn mode should be used between networks?
Tunnel
What does transport mode protect?
Only the IP payload.
What does tunnel mode protect?
The IP payload and header