Weak Spots Flashcards

1
Q

SAML

A

Used to exchange authentication and authorization information between federated organizations; often SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SPML

A

Service Provisioning Markup Language. Designed for exchanging user information for federated identity SSO purposes; can display LDAP based directory information in XML format.

SPML is used to provision users, resources, and services, not for authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type 4 Authentication

A

Somewhere you are (IP/MAC address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type 5 Authentication

A

Something you do (signature, pattern unlock)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Due Care

A

Due care principle states that an individual should react in a situation using the same level of care that would be expected from any reasonable person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Due Diligence

A

Due diligence is more specific than due care; states that an individual assigned a responsibility should exercise due care to complete it accurately in a timely manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SOC 1

A

Financial audit report; has Type 1 and Type 2.

“focuses guidance for auditors assessing financial statement controls at service organizations”; internal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SOC 2

A

IT security audit report; has Type 1 and Type 2; available to management and others under strict NDA–not widely public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOC 3

A

More generalized, less sensitive version of SOC 2 IT security audit report ; public facing document, sanitized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Atomicity

A

All or nothing; if part fails, the entire tx must fail and roll back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Consistency

A

Rules must be all still in tact after a tx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Isolation

A

Txs operate separately from each other. One tx must complete in its entirety, before the next is allowed to modify the same data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Durability

A

One a tx is committed to a db, it must be preserved, by way of backup mechanisms such as tx logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confusion

A

Relationship between key and ciphertext. One bit change in key should cause 50% change in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Diffusion

A

Relationship between plain text and cipher text. One bit change in plain text should cause 50% change in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOC (#) Type 1

A

Describes controls and provides auditors opinion based on that description. Covers a single point in time and does not involve actual testing of the controls

17
Q

SOC (#) Type 2

A

Covers a minimum 6 month point in time and includes opinion of auditor about effectiveness based on ACTUAL testing

18
Q

SDLC (First half)

A

1) Project initiation and planning; 2) Functional requirements definition; 3) System design specification

19
Q

SDLC (Second half)

A

4) Development and implementation; 5) Documentation and common program controls; 6) Testing and evaluation (which includes certification and accreditation); 7) Transition to production / implementation

20
Q

Swapping

A

Moving entire process from memory to disk

21
Q

Paging

A

Moving fixed-length blocks of memory to disk

22
Q

DARPA TCP/IP Model Layers To to Bottom

A

Application / Host-to-host Transport / Internet / Network access

23
Q

What layers are segements, packets, frames, and bits at

A

Transport/segments Network/packet Datalink/frames Physical/bits

24
Q

GDPR provisions

A

data breach notification in 72 hours; each member nation must create a centralized data protection authority; individuals must have access to their own data; information must be transferrable; individuals have right to be forgotten / have information deleted

25
Q

Forced Browsing

A

Brute-force attempt to access content by modifying urls or trying /admin

26
Q

CSMA/CD

A

half duplex; one device at a time, if collision occurs, random wait

27
Q

STRIDE

A

an aggregated threat-modeling methodology developed by Microsoft (Spoofing; tampering; repudiation; information disclosed; DoS; elevation of privilege)

28
Q

Live workloads

A

Simulated behavior, and do not involve live data

29
Q

Virtual memory

A

Maps hw memory addresses to applications; not a copy process to disk technique

30
Q

Type I biometric errors

A

False reject rate

31
Q

Type II biometric errors

A

False accept rate

32
Q

Boundary testing

A

A specific form of negative testing in which values that are known to be out of
the range of accepted values are input into given form fields to determine whether the application
handles such errors appropriately.

33
Q

Positive testing

A

A form of software testing that is intended to determine whether an application is
working as it is designed to work.

34
Q

CRUD testing

A

Create. Read. Update. Delete. A form of software testing that is intended to ensure that database objects are being
created correctly. CRUD testing can be used to reveal and troubleshoot caching issues as well as any
issues that might arise from simultaneous attempts to perform the same function.

35
Q

Extra SLC Phases (post SDLC)

A

8) Operation and maintenance support; 9) Revision and system replacement / disposal