Wiley_08072017 Flashcards

1
Q

This is necessary to obtain a Search Warrant

A

PROBABLE CAUSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISC Code of Ethics:

A
  • Protect society, the commonwealth, and the infrastructure.
  • Act honorably, honestly, justly, responsibly, and legally.
  • Provide diligent and competent service to principals.
  • Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prudent Man Rule is from what guideline?

A

The Federal Sentencing Guidelines formalized the prudent man rule and applied it to information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Christopher would like to send Renee a message using asymmetric encryption. What key should he use to encrypt the message? Renee’s public key is used to encrypt the message.

A

The sender of a message uses the recipient’s public key to encrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is generated by the difference in power between the hot and ground wires of a power source or operating electrical equipment

A

Common mode noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Security Label protects against

A

Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Warm Sites take ___ hours to recover

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet Switching has ______ delays.

Circuit Switching has _______ delays.

A

Packet = Variable Delays

Circuit = Fixed Delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replaced SSL

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ _________ mechanisms are set in place to establish a means of verifying the correctness of detection systems and sensors

A

Secondary verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Audit Report Requirements:

A

purpose

scope

results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ______ is created through the assignment of an IP address and a subnet mask.

A

subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ connects disparate networks rather than creating network segments

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Routers only manage traffic between ______

A

subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ is a networking device that can be used to create digital network segments (i.e., VLANs) that can be altered as needed by adjusting the settings internal to the device rather than on end-point devices

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spoofing Countermeasures

A

SPOOFING Countermeasures:
Patching

Source/Destination Verification on Routers

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPU _________ are the fastest form of memory..

A

registers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

______ is a subset of sampling, which is a process of extracting data from a large body of information but with a specified cut-off point or threshold

A

Clipping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IDSs can detect attacks from:

A

1) external connection attempts,
2) execution of malicious code,
3) unauthorized access attempts to controlled objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The document Ethics and the Internet was issued as RFC 1087 by the ____ ____ ____

A

Internet Advisory Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CESAR Cipher is a ________ CIPHER

A

SUBSTITUTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Block Cipher: Operate on __________and apply the encryption algorithm to the __________message block.

A

CHUNKS, ENTIRE

Used by most modern encryption algorithms used BLOCK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Substitution Cipher: Replace with a different ________.

A

Character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Stream Ciphers: Operate on ____ bit or character at a time.

A

ONE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ONE TIME Ciphers are ______CIPHERS…

A

STREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A _______ is a system that hides the true meaning of a message. This uses a variety of
techniques to alter and/or rearrange the characters or words of a message to achieve
confidentiality….

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CIPHER provides ____________

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CFB vs CBC: Cipher Feedback Mode (CFB) uses a _________ cipher, compared to CBC’s block cipher.

A

streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cipher Feedback (CFB): A mode in which the DES algorithm is used to encrypt the
preceding block of cipher text. This block is then XORed with the _________block of plain text
to produce the next block of cipher text….C F B uses a STREAMING cipher..

A

Next

Hint CFB is “NEXT”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cipher Block Chaining (CBC): A process in which each block of unencrypted text is
XORed with the block of cipher text immediately preceding it before it is encrypted using
the DES algorithm…
In Cipher Block Chaining (CBC) mode, each block of unencrypted text is XORed with the block of cipher text immediately __________it before it is encrypted using the DES algorithm.

A

preceding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

TCP IP Handshake

A

SYN
SYN/ACK
ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Provides daily updates on fires

A

N I F C provides daily updates on fire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This attacks the three-way handshake process used by TCP/IP to initiate communication sessions

A

SYN Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

AGILE Software Development prefers being FLEXIBLE as opposed to following a _____

A

Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Auxiliary alarm systems facilitate local, remote, and centralized alarm systems by notifying external sources (police, fire, and medical) of signifying events…
AUXILARY ALARMS will notify ______Sources…

A

EXTERNAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A _______ is a form of gate that prevents more than one person at a time from gaining entry and often restricts movement in one direction.

A

turnstile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

RSA is an example of __________cryptography, which does not require a preexisting relationship to provide a secure mechanism for data exchange. Two individuals can begin communicating securely from the moment they start communicating…

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

RSA does not have a _________ relationship and can start communications quickly…

A

pre existing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

3 Common forms of Governance:

A

1) IT …2) CORPORATE…3) SECURITY..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

_________ is the periodic examination and review of a network to ensure that it meets security and regulatory compliance..

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

_________mode noise is generated by the difference in power between the hot and ground wires of a power source or operating electrical equipment…next topic..

A

Common

42
Q

REAL EVIDENCE – Tangible. Can be brought in to court. This is usually ________EVIDENCE..

Next topic…

A

CONCLUSIVE

43
Q

DOCUMENTARY EVIDENCE – Written items to prove a ____. Must be authenticated.

A

fact

44
Q

BEST EVIDENCE - must be the ______.

A

ORIGINAL

45
Q

PAROLE EVIDENCE means evidence is _______and NOT verbal.

A

written

46
Q

Static Packet Filtering Firewall - ..Layer ______, A static packet-filtering firewall filters traffic by examining data from a message header….

A

3,

47
Q

Static Packet Filtering Firewall - .. Layer 3 (NETWORK). A static packet-filtering firewall filters traffic by examining data from a message _______.

A

header

48
Q

Application Level Gateway Firewall - ..Layer 7, A K A Proxy..Filters traffic based on Internet Service OR Application..SLOW and considered ____ generation. Operates at Layer 7. ..

A

2nd

49
Q

Circuit Level Gateway Firewall – Layer ___(Session). SOCKS (Socket Secure). 2nd generation. Manages based on Circuit as opposed to the content. Allows and Denies strictly on SOURCE/DESTINATION address and port. ..

A

5,

50
Q

Circuit Level Gateway Firewall – Layer 5 (Session). SOCKS (Socket Secure). 2nd generation. Manages based on Circuit as opposed to the _______. Allows and Denies strictly on SOURCE/DESTINATION address and port. ..

A

content

51
Q

2 Types of MULTIPROCESSING systems

A

SMP and MMP

52
Q

used to create a UNIQUE CIPHER TEXT every time the same message is encrypted with the same key…

A

Initialization Vector

53
Q

802.3 is Layer ___

A

2

54
Q

An initialization vector (IV) is a random bit string (a nonce) that is the same length as the block size that is XORed with the message. IVs are used to create a unique cipher text every time the same message is encrypted with the same key…

A

IV

55
Q

SAML attacks are often focused on ______authentication…

A

web-based

56
Q

What are the two VPN modes?

A

Tunnel and Transport

57
Q

The Code of Federal Regulations (CFR) is an example of __________ law.

A

administrative

58
Q

Who provides daily updates on wildfires occurring in the United States.

A

The National Interagency Fire Center

59
Q

Macro viruses use scripting languages such as _____ ______ for Applications..

A
Visual Basic..
MACRO viruses use SCRIPTING..
Macro viruses use V B Script..
MACRO uses scripting..
MACRO uses scripting..
60
Q

_________serve as operational guides for both security professionals and users. They are flexible, so they can be customized for each unique system or condition. This document states what should be done (in other words, what security mechanisms should be deployed) instead of prescribing a specific product or control and detailing configuration settings. These outline methodologies, include suggested actions, and are not compulsory…

A

Guidelines

61
Q

IPX/SPX, AppleTalk, and NetBEUI are examples of __ ___ protocols.

A

non-IP protocols.

62
Q

_______– Interrupts and Takes Over..
________ – RELAYS..
_________ – TARGETS 2 ROUND ENCRYPTION SUCH AS DOUBLE DES..

A

HIJACK – Interrupts and Takes Over..

MAN IN THE MIDDLE – RELAYS..

MEET IN THE MIDDLE – TARGETS 2 ROUND ENCRYPTION SUCH AS DOUBLE DES..

63
Q

_________uses a “lock” feature to allow an authorized user to make changes and then “unlock” the data elements only after the changes are complete.

A

Concurrency

64
Q

_______ model uses multiple iterations of the waterfall model, so it is considered a meta-mode..
This is a form of WATERFALL.

A

Spiral model uses multiple iterations of the waterfall model, so it is considered a meta-mode..
Spiral Model is a form of WATERFALL.

65
Q

________is the process by which online activities of user accounts and processes are tracked and recorded..

A

Auditing

66
Q

________is freedom from being observed, monitored, or examined without consent or knowledge..

A

PRIVACY

67
Q

ECC-RSA ____-bit key is the equivalent of an RSA _____-bit key..

A

ECC RSA 160 bit = RSA 1024 bit..
ECC RSA 160 bit = RSA 1024 bit..
ECC RSA 160 bit = RSA 1024 bit..

68
Q

____________access control operates on a set of defined rules or restrictions that filter actions and activities performed on the system. System wide restrictions that override object access..

A

Nondiscretionary

69
Q

INTEGRITY and ________depend on Each Other..

A

CONFIDENTIALITY

70
Q

________attack, the attacker is racing with the legitimate process to replace the object before it is used..
tries to be beat the legitimate process before it is used..

A

TOC/TOU

71
Q

_________, removes but does not repair..Removal of a virus, removes but does not repair..

_________,removes virus and repairs damage..

A

Removal, removes but does not repair..Removal of a virus, removes but does not repair..

Clean removes virus and repairs damage..

72
Q

_________,removes virus and repairs damage..

A

Clean removes virus and repairs damage..

73
Q

When audit trails legally prove accountability, then you also reap the benefit of _______..

A

nonrepudiation

74
Q

______ ______ ______ are designed to prevent unauthorized, insecure, or restricted information flow, often between different levels of security..

A

Information flow models

75
Q

Databases: The event that occurs when two or more rows in the same table appear to have identical primary key elements but contain different data for use at differing Classification levels. This is often used as a defense against some types of inference attacks.

A

Polyinstantiation

76
Q

Database transactions must be _____—that is, they must be an “all‐or‐nothing” affair..

A

Atomic

77
Q

DSA: The Digital Signature Algorithm (as specified in FIPS 186-2) supports true digital signatures, providing integrity verification and .

A

nonrepudiation

78
Q

Biba and Clark Wilson provide ______

A

Integrity

79
Q

3DES effective key length ___ Bit..

A

3DES effective key length 168bit..

80
Q

______ ________ attack may be used on encrypted messages..

A

Frequency Analysis

81
Q

A ____ _____ maintains a row of security attributes for each controlled object. This is also a row of an access control matrix.

A

capabilities list

82
Q

A _____ ______ is closely associated with the access control matrix..

A

capabilities list

83
Q

IPSEC needs ______in order to be secure on a dialup

A

L2TP

84
Q

In a _______security mode system, there is no requirement that all users have appropriate clearances to access all the information processed by the system…

A

Multilevel

85
Q

_________ model allows the development process to return only to the immediately preceding phase of development at any given time.

A

Waterfall

86
Q

______ ______ and Job Rotation support peer auditing..

A

Mandatory vacations

87
Q

2 examples of Peer Auditing

A

Mandatory vacations and Job Rotation

88
Q

The __________phase usually concludes with the notification of the incident response team.

A

identification phase

89
Q

This type of system houses hundreds or thousands of CPU’s that have their own operation system.

A

MMP Massively Parallel Processing

M M P used for large, complex tasks.

90
Q

implement multithreading techniques at the operating system level…Single..Operating System level..S M P used for simple operations..This system is the O S level..

A

SMP Symmetric multiprocessing systems

S M P sends threads to available processor for simultaneous execution..

91
Q

A _____ ______ is any method that is used to secretly pass data and that is not normally used for communication. Covert Channeling can be difficult to detect. Need to AUDIT and ANALYZE logs.

A

Covert channel

92
Q

How to mitigate Covert Channel

A

Audit, Monitor, Analyze

93
Q

Two types of Covert Channels: 1) Covert TIMING Channel – Alters system performance or timing in a _____ manner…2) Covert STORAGE Channel – Writes data to common ______area so another process can read it.

A

Predictable

Storage

94
Q

When an intruder is detected by an I D S, they are transferred to a ____ ______. The transfer of the intruder into a padded cell is performed automatically, without informing the intruder that the change has occurred. The padded cell is unknown to the intruder before the attack, so it cannot serve as an enticement or entrapment. Padded cells are used to detain intruders, not to detect vulnerabilities….

A

padded cell

95
Q

One of the most common vulnerabilities and hardest to protect against is the occurrence of ______ and _______ …

A

occurrence of errors and omissions

96
Q

types of FIREWALLS (4):

A

Static

Application

Circuit

Stateful..

97
Q
Name this Firewall:
Layer 3 (Network) and 4 (Transport), 3rd generation.  Looks at source/destination ports, addresses and applications.
A

Stateful Inspection Firewall – A K A DYNAMIC.

98
Q

Two Firewall Modes

A

Transport Mode: In transport mode, only the IP packet data is encrypted, but the header of the packet is not..

Tunnel Mode: Tunnel mode, HEADER AND PACKET DATA IS ENCYRPTED. The source and destination IP addresses are encrypted and an ESP header is added followed by a new IP header…When IPSec is used in tunnel mode, entire packets, rather than just the payload, are encrypted. This mode is designed for use in gateway-to-gateway TUNNEL IS MORE SECURE.

99
Q

Which Firewall mode only encrypts IP Packet Data and NOT Header

A

Transport

100
Q

Which of the two FW modes are more secure and why.

A

Tunnel is more secure because Header and Packet are Encrypted.