Unit 2 Test Bullshit Flashcards
What is hashing?
Transforming any key or string of values into another.
Who created Message Digest 5 (MD5) and what value does it create?
Ron Rivest and it produces a 128-bit hash value.
What are the variants of Secure Hash Algorithm SHA?
SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)
What is salting?
Salting adds another layer of security to hashing by allowing the owner to choose a string before hashing starts.
(HMAC) is used for what?
Providing a key input to a hash algorithm to make it more secure.
What do digital signatures provide?
used to determine if someone edits a document after the user signs it, check the authenticity of a message, digital document, or software.
What is a digital certificate?
Enables users and orgs to exchange information securely over the internet.
Equivalent to an electronic passport.
Hash functions are ______________ functions. It is computationally infeasible for two different sets of data to come up with the same output.
one-way
Integrity ensures that data remains unchanged and __________________ by anyone or anything over its entire life cycle.
trustworthy
Because a hash value changes every time data is changed, cryptographic hash values are often called digital ___________________________.
fingerprints
Hashing is relatively easy to compute and equally easy to reverse.
T or F
F
Cryptographic hash functions have the following properties:
a.
The output has a fixed length.
b.
Two different input values will almost never result in the same hash values.
f.
The input can be any length.
g.
The hash function is one way
An 8-bit checksum calculates the hash by converting the message into ____________________ numbers
binary
The 8-bit checksum 2’s complement converts a binary to its opposite value, and then it adds ___________
one
What malware compromised the security of MD5 in 2012?
Flame
SHA is short for what?
secure hash algorithm
MD5 is short for what?
message digest 5
What Cisco command verifies the integrity of IOS images used on Cisco routers?
verify / md5
Hashing is vulnerable to ______________________ attacks and does not provide security to transmitted data.
man-in-the-middle
A _________________________ attack attempts every possible combination of characters up to a given length.
brute-force
A _______________________ attack uses a file containing common words, phrases, and passwords.
dictionary
___________________ creates a different hash result for two users who have the same password.
salting
A ____________________ table stores the pre-computed hashes of passwords in a password dictionary along with the corresponding password.
lookup
CSPRNGs generate a random number that has a high level of randomness and is completely unpredictable, so it is cryptographically secure.
T or F
True
VPNs using IPsec rely on HMAC functions to authenticate the origin of every packet and provide data integrity checking.
t or f
True
A(n) ______________ trail tracks an electronic document’s history for regulatory and legal defense purposes.
audit
_________________________ is a way to ensure that the sender of an electronic message or electronic document cannot deny having sent the message or document and that the recipient cannot deny having received the message or document.
Non-repudiation
______________________ cryptography is the basis for digital signatures.
asymmetric
_____________________________________________________(PKI) is the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.
public key infrastructure
A bank clerk has exceeded a predetermined number of record modifications within a specific period of time block.
Their manager must then flag the record as legitimate (or not). This is an example of what Data Field Validation Control?
maximum record modification trigger
System locks from unusual activity indicate what Data Field Validation Control?
unusual activity trigger
Data field validation via input ______________ prevents users from entering invalid data or help ensure that they enter data consistently.
masks
What data integrity constraints matches these descriptions?
a. All rows must have a unique identifier called a Primary Key
b. All data stored in a column must follow the same format and definition.
c. A set of rules defined by a user which does not belong to one of the other categories
d. Table relationships must remain consistent
a. Entity Integrity
b. Domain Integrity
c. User-defined Integrity
d. Referential Integrity
_________________ in a database signifies missing or unknown values.
null
NIST developed a “best practices” for Business Continuity.
Place these steps in the proper order as presented in our reading (and from NIST):
Develop recovery strategies Develop the contingency plan Identify preventive controls Calculate risk Conduct the business impact analysis Maintain the plan Develop the policy statement Test the plan
1. Develop the policy statement 2. Conduct the business impact analysis 3. Calculate risk 4. Identify preventive controls 5. Develop recovery strategies 6. Develop the contingency plan 7. Test the plan 8. Maintain the plan
In regards to IT disaster recovery, preventative controls include keeping data backed up, keeping data backups off-site, using ____________________, or installing generators.
surge protectors
In regards to IT disaster recovery, Detective controls include using up-to-date _______________ software.
antivirus
An organization’s DRP restores mission critical systems first.
T or f
True
What are strikes and walkouts considered? (event
Labor events
What are vandalism, protests, sabotage ,terrorism, and war considered? (events
Social-political events
__________________ is a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch.
NetFlow
An IPS device operates in __________________ mode.
inline
CSIRT is the acronym for what term?
computer security incident response team
______________________ is the methods and configurations used to make a system or network tolerant of failure.
resiliency
The ability of a network to dynamically recover from the failure of a device acting as a default gateway is known as ________________ redundancy.
first-hop
The _______________________________ is typically the router that provides devices access to the rest of the network or to the Internet.
If there is only one router serving in this role, it is a single point of failure.
default gateway
_________________________ Protocol prevents loops on a network when switches interconnect via multiple paths.
Spanning tree
With RAID:
_____[a]_____ detects data errors.
_____[b]_____ writes data across multiple drives.
_____[c]_____ stores duplicate data on a second drive.
parity
striping
mirroring
What is the minimum number of disks in a RAID 0+1 ?
2
What is the minimum number of disks in a RAID 1 ?
3
A car has four tires and a spare tire in the trunk in case of a flat.
This is a comparative example of ____________ Redundancy
N + 1
If an organization implements complex systems that are hard to understand and troubleshoot, it may actually backfire.
What type of defense best alleviates this issue?
Simplicity
Concealing certain types of information makes it more difficult for cyber criminals to attack a system.
This would be considered what type of defense?
Obscurity
To accomplish a goal of _____________________, organizations can use security products manufactured by different companies for multifactor authentication.
Diversity
Employees in the the shipping department do not need access to marketing presentations to perform their jobs.
This is an example of what defense?
Limiting
An organization stores its confidential documents on a server in a building surrounded by an electronic fence.
This is an example of what defense?
Layering
Mitigation involves reducing the _____[a]_____ of the loss or the likelihood of the loss from occurring
Severity
Many technical controls mitigate risk including authentication systems, _____[b]_____, and firewalls.
file permissions
The ___________________ Corporation maintains the CVE List and its public website.
MITRE
When discussing asset and systems standardization, COTS is short for what?
commercial off-the-shelf
Asset management manages the __________________ and inventory of technology assets including devices and software.
lifecycle