Topic 8 - Implementing Network Security Flashcards

1
Q

What are two advantages of RBAC

A

Easier to implement, low security cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Secure Boot

A

Feature ensures that a computer boots using only software that is trusted by the computer manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Measured Boot

A

This feature sends a log of components loaded prior to the anti-malware software so that the anti-malware software can detect if there is malware on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Unicast Reverse Path Forwarding do and what are the modes?

A

It protects against spoofing attacks by ensuring the router confirms the address to which a packet is being forwarded is reachable.

Loose - The address of the packet must appear in the routing table
Strict - The packet must originate on the same interface that the router would use for the return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a bastion host?

A

A system that is hardened to resist attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is war driving?

A

A method of discovering 802.11 wireless networks by driving around with a laptop and looking for open wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the common criteria (CC) seven levels

A

EAL1 - Functionally tested
EAL2 - Structurally tested
EAL3 - Methodically tested and checked
EAL4 - Methodically designed, tested and reviewed
EAL5 - Semi-formally designed and tested
EAL6 - Semi-formally verified design and is tested
EAL7 - Formally verified design and is tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “flaw hypothesis methodology” used for?

A

Used to analyze OS vulnerabilities in a penetration testing project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly