testing questions missed Flashcards
what is MAC dealing with OSI and what layer
- Media Access Control
- Layer 2
OSI layer 2 - what is it and what operates there
- mac addresses
1. 48 bits
2. threats: mac spoofing and mac flooding - bridges and switches (L2) (asume L2 switch unless it says on the test)
- LLC (logic link control)
what is layer 4 of OSI model, what works there, what devices, what ports
- Transport layer
- responsible for end to end connection with error correction and detection
- Ports - 65,535 total (know some common ports)
- TCP/UDP and SSL/TLS(used to encrypt http and other data traffic) (makes sure to know tcp/udp nuances)
What are three major public key cryptosystems (algorithms)
- RSA
- El Gamal (less used)
- elliptic curve (strongest)
what type of network discovery scan only uses the fist two steps of the TCP handshake?
- tcp connect scan
- xmas scan
- tcp syn scan
- tcp ack scan
- tcp syn scan
Note: the syn scan is all you need because
* you send the syn and get the reply back of syn ack (first two steps)
what type of interface testing would identify flaws in a program’s command-line interface?
- application programming interface testing
- user interface testing
- physical interface testing
- security inteface testing
- user interface testing
* user inteface testing includes assessments of boht graphical user interfaces (GUIs) and command line interfaces (CLI) for a software program
Paul would like to test his application against slightly modified versions of previously used input. what type of test does Paul intend to perform?
- code review
- application vulernability review
- mutation fuzzing
- gereration fuzzing
- mutation fuzzing
uses bit flipping an other techniquest to slightly modifiy input testing
what information security management task ensures that the organization’s data protection requirements are met effectively?
- account management
- backup verification
- log review
- key performance indicators
- backup verification
NOTE: this was slighly tricky. verifying the backup processes are running properly is a check to help verify data protection
just enough to provide an answer - try not to over think
I went after performance indicators, thinking backup verification was not enough but I was wrong
which of the following steps would be included in a change management process (select all that apply)
- immediately implement the change if it will improve performance
- request the change
- create a rollback plan for the change
- document the change
- request the change
- create a rollback of the change
- document the change
documentation is not after the change request, its part of it
security administrators are regularly monitoring threat feeds and using that information to check systems with the network. their goal is to discover any infections or attacks that haven’t been detected by existing tools. what does this describe?
- threat hunting
- threat intelligence
- implementing the kill chain
- using artificial intelligence
- threat hunting.
Note: they are actively looking for attacks, not just using the intelligence gathered to build a better defense.
you operate a grain processing business and are developing your restoration priorities. which one of the following systems would likely be your highest priority?
- order processing system
- fire suppression system
- payroll system
- website
- fire suppression system
Note: always choose human life - fire suppression equals saving human life
Human safety is always NUMBER one
Electronic Discovery steps (EDRM)
eDiscovery steps
- Identification
- Preservation
- Collection
- Processing
- Review and Production
which one of the following attacker actions is most indicative of a terrorist attack
- altering sensitive trade secret documents
- damaging the ability to communicate a respond to a physical attack
- trasferring funds from an unapproved source into your account
- selling a botnet for use in a DDoS attack
- damaging the ability to communicate a respond to a physical attack
UEBA is what
- User and entity behavior analytices
- baselines of behavior modeling
- this typically involves machine learning
- denys, alerting, etc. when something is outside the norm
Cobit
- framework developed by the information systems audit and control association (ISACA) and the IT governance Institution (ITGI)
- defines goals for the controls that should properly manage IT and ensure IT maps to business needs, not just security needs
- COBIT broadly focuses on risk management that can be applied to various business areas
COBIT address what is to be achieved… ITIL address how to achieve
ITIL
- The Information Technology Infrastructure Library
- the de facto standard of best practices for IT service management
- a customizable framework, ITIL provides the goals, the general activities necessary to achieve these goals, and the input and output value for each process requied to meet these goals
COBIT address what is to be achieved..ITIL address how to achieve
OECD
- Organization for Economic Co-operationand Developement
- develeped guidelines for various countries so that data is properly protected and everyone follows the same rules
What is IP Masquerade
- IP Masquerade is a networking function in Linux similar to the one-to-many
a number of factors should be considered when assigning values to assets. which of the following is not used to determine the value of an asset?
- the assets value in the external marketplace
- the level of insurance required to cover the asset
- the initial and outgoing cost of purchasing, licensing, and supporting the asset
- the asset’s value to the organization’s production operations
- the level of insurance required to cover the asset
NOTE: the cost of insurance is not the important factor. you need to know the asset value before getting an isurance cost ( i guess duh)
risk assessment has several different methodologies. which of the follwing official risk methodologies was not created for the purpoose of analyzing security risks
- FAP
- OCTAVE
- ANZ 4360
- NIST SP 800-30
- anz 4360 -
* it can be used for risk assessment but was not created for that purpose
* ANZ 4360 can be used to understand a complany’s financial, capital, human safety and business decisions risk
name some offical risk assessment methodologies
- FRAP - (Facilitated Risk Analysis Process) aims to get conclusions about risks quicker.
- OCTAVE - a risk-based strategic assessment and planning technique for security
- NIST SP 800-30 - guide for conduction risk assessment
threat modeling methodology uses one of 3 approaches - what are these approaches
- attacker centric
- asset centric
- system (software) - centric
* according to CBK system or software centric methods like stride are the most useful
what is a threat modeling methodology that is an example of attacker centric and some attributes
- PASTA
* focuses on each threat and its TTP (tactics, techniques and procedures)
* starts by identifying threats then attempts to find vulnerability attack paths
what is an example of asset centric threat modeling methodology
- NIST 800-154
* first identifies critical assets
* then determines how threats might compromise them
of the 3 threat modeling methodoloies, according to CBK, one of them is more useful.
which one are they refering to and list some attributes
- system or (software) centric are the most useful
* STRIDE is an example
* they represent interconnected processes
* often use data flow diagrams to access trust boundries and needed controls
what is 802.1x
- port based network access control (PNAC)
what is 802.1q
- Virtual Local Area Networking
(VLAN)
In what phase of the Capability Maturity Model for Software (SW-CMM) are quantitative measures used to gain a detailed understanding of the software development process?
- repeatable
- defined
- managed
- optimizing
- managed
NIST maturity model steps
- Initial - no organized processes (adhoc)
- Repeatable - some processes are reteatable, a formal program has been initiated. some processes defined an dcoumented
- Defined - processes have become formal, standardized, and defined (consistency)
- Managed - organization begins to measure, refine, and adapt their security processes. more effective and effecient based on information from the program
- Optimizing - has processes that are automated, documented, and constantly analyzed for optimization. cybersecurity is part of the overall culture
type I biometric error
- False positive
- False Reject Rate
you have been selected to manage a software development project. your supervisor asked you to follow the phases oin the systems/sofware develpment life cycle.
In which phases will the system be tested by an independent third party
1. acceptance
2. testing and evaluation controls
3. documentation and common program controls
4. functional requirements definition
- acceptance - is the phase at which the software is tested by an independent third party. the testing process includes functionality test and security test, which should verify that the software meets all the functional and security specifications that were documented in previous phases
What is an example to explain this process
MAC (message authentication code) or HMAC
(hased message authentication code) without using PKI
- bob and alice decide on a shared secret
- bob hashes the mesage (sha2)
- bob encrypts that hashed message with the shared secret known only by alice
- this is MAC or HMAC
- alice reverses the process to provide authentication
if something is cod signed does it mean its safe to use on your computer?
it does not! it simply means the creator has been verified
digital Signature - non-repudiation
- DSA (digital signature algorithm)
- SHA1 or SHA2
- asymmetric (RSA or ECC) encryption and (RSA or ECC) keys on the hash
FM-200 question below
- Not to be confused with a CO2 System, FM 200 fire suppression systems are electrically non conductive and safe for humans.
what can be used to obtain the plaintext value of a hashed password
rainbow table
* hashed algorithms like md5 and sha1 can be used to create a message digest of data
which of the follwing must a user have for all information precess in system high mode?
- security clearance, access approval and a valid need to know
- a security clearance and access approval
- a security clearance and valid need to know
- security clearance
- a security clearance and access approval
is licensing part of the SDLC
no
what mode is AH typically used with ESP and why
1. transport
2. tunnel
Transport
what is double encoding used for
- the act of encoding data twice in a row using the same encoding scheme. It is usually used as an attack technique to bypass authorization schemes or security filters that intercept user input
what is forced browsing
- Forced browsing is an attack where the aim is to enumerate and access resources that are not referenced by the application, but are still accessible.
- An attacker can use Brute Force techniques to search for unlinked contents in the domain directory, such as temporary directories and files, and old backup and configuration files. These resources may store sensitive information about web applications and operational systems, such as source code, credentials, internal network addressing, and so on, thus being considered a valuable resource for intruders
what is PIPEDA
The Personal Information Protection and Electronic Documents Act is a Canadian law relating to data privacy.
lockdown enclosure is for what
- Lockdown enclosure prevents theft of computer equipment
what are these fire extinquishers for
1. A
2. B.
3. C
- A – wooed, paper, cloth
- B – flammable liquids
- C – electrical panel, motor wiring etc.
Electronic vaulting
- Electronic vaulting makes a copy of data to a backup location. This is a batch process operation that functions to keep a copy of all current records, transactions, or files at an offsite location
what is CYOD
- choose your own device
* sometimes this is an option for devices to use at work. they are typically chosen from an approved list
with SDN what is plane is centralized
* SDN management
* SDN control
* SDN data
* SDN Policy
- SDN Architecture The SDN control plane is centralized
circuit switching
- once built the circuit is always there even when not used
- this can be considered a waste of resources
- common types
- POTS
- PSTN
- T1, E1, T3, E3
- ISDN
packet switching
- Packet switching is how we think of networking today. We take our data, we put it into a wireless network, or a wired network, and we send the traffic on its way, and it finds its way to its destination. This might be data, it might be video, it might be voice– doesn’t matter. We’re sending this data out over the network and it’s finding its way and switching based on what’s in the packet. Usually this media is shared.
XOR
- if the values are the same its a 0
- if the values are different its a 1
ARP
translating IP to MAC
* computer has the IP of the device, just needs to MAC so they can talk at lower layers
what is NAC
- NAC systems are there to ensure that only the right users with authenticated and reliable devices (whether they belong to the company or the individual themselves) can log on to the network. Once they are there, the NAC regulates the areas of the network users can access while monitoring and logging their activity
- principle of 3 (AAA)
- authentication, authorization, accounting
which is NOT likely a vulnerability with kerboros authentication method
* theft of cached credentials
* a single point of failure
* a password guessing attack
* susceptibality to eavesdropping
- susceptibality to eavesdropping
which of the following is not a method for protecting data at rest
- network level encryption
- database level encryption
- folder level encryption
- application level encryption
- network level encryption is not
- note: i originally answered this wrong. I think application level, is data in use, apparently if its in flash its considered rest. I did not think about that data that could be stored on the application server
which of the following best describe the purpose of a key destribution center (KDC)
- sending a service ticket (ST) to an authenticated user when the user requires a network service
- enabling single single sign on services by acting as a trusted thirdparty authentication server
- enabling an authenticated user to request access to network services
- sending a second session key to an authenticated user when the user requires access to a network service
- enabling single single sign-on services by acting as a trusted third-party authentication server
what device increases broadcast domains
- router
- in a router, each interface is a seperate broadcast domain
- routers do not forward broadcast
***note: not for the test; however a L3 switch does this also. its why i got it wrong. I was thinking L3 not L2 when i answered. The test considers switches L2 unless they say different (remember)
ALE formula
SLE X ARO
Note: remember if you are comparing something you are buying to a lease. you have to make sure the cost of the purchase is included in teh forumala over time.
Example : cost of printer then figure your ale over X amount of years. you have to add the cost of original purchase to the ALE cost over that span of years compared to a lease over that same span of time.
a TFTP server recieves a request from a client devic on UDP 69.
which port number will the server use to send a response back to the client
- The TFTP server listens continuously for requests on well-known UDP port number 69, which is reserved for TFTP
- The client chooses for its initial communication an ephemeral port number, as is usually the case in TCP/IP
** ephemeral ports are short period communications RANGE - 1024-65535
what is the primary concern with bluetooth version 2.1
- weak encryption
- verion 4.1 has a much stronger cipher EAS-CCM
which privacy act was created in 74 to provide citizens with access to private information that is being collected and maintained by teh governmant
U.S. Privacty act
what is the job duties of a security administrator
- responsible for user account management and reivews of audit data
- assigning user accounts and security settings
- usual lesser permissions compared to system administrators
what is the role of a system administrator
- monitors and maintains the systems and applications
- can be more specialized such as DBA or network admin
what is true about OSPF
- it learns the entire network topology for the area
what best decribes groupings of subjects and objects that have the same security requirement
- security domains
- layering
- obstraction
- the ring model
- security domain
what database type does DNS use
- Hierarchical database
what is object reuse
the process of reusing data or authentication credentials that application or process has shared in memory or cachedd to disk. when data or credentials are retrieved and used by another user, applications, or process, unauthorized priveilege escalation can occur.
*** object reuse can be mitigated by developing tight controls over the sharing of such objects in memory and by ensuring that a cached credentials are removed from memory when they are no longer required
what type of obfuscation deals with making a program obscure to computers
Pevention obfuscation
can a switch reduce collision domains
a switch creates seperate collision domains for each switch port
what type of physical lock is the most vulnerable to shoulder surfing and brute force(trying every combo possible)
- a lock with a keypad
*** they are easier to see you put in your code and typically less digits, so easier to attempt a brute force
what secruity architecture model are you most likely to implement to avoid covert channel attacks
noninterference