Wiley_08072017 Flashcards
This is necessary to obtain a Search Warrant
PROBABLE CAUSE
ISC Code of Ethics:
- Protect society, the commonwealth, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
Prudent Man Rule is from what guideline?
The Federal Sentencing Guidelines formalized the prudent man rule and applied it to information security
Christopher would like to send Renee a message using asymmetric encryption. What key should he use to encrypt the message? Renee’s public key is used to encrypt the message.
The sender of a message uses the recipient’s public key to encrypt it.
This is generated by the difference in power between the hot and ground wires of a power source or operating electrical equipment
Common mode noise
A Security Label protects against
Tampering
Warm Sites take ___ hours to recover
12
Packet Switching has ______ delays.
Circuit Switching has _______ delays.
Packet = Variable Delays
Circuit = Fixed Delays
Replaced SSL
TLS
_______ _________ mechanisms are set in place to establish a means of verifying the correctness of detection systems and sensors
Secondary verification
Audit Report Requirements:
purpose
scope
results
A ______ is created through the assignment of an IP address and a subnet mask.
subnet
________ connects disparate networks rather than creating network segments
Router
Routers only manage traffic between ______
subnets
_________ is a networking device that can be used to create digital network segments (i.e., VLANs) that can be altered as needed by adjusting the settings internal to the device rather than on end-point devices
Switch
Spoofing Countermeasures
SPOOFING Countermeasures:
Patching
Source/Destination Verification on Routers
IDS
CPU _________ are the fastest form of memory..
registers
______ is a subset of sampling, which is a process of extracting data from a large body of information but with a specified cut-off point or threshold
Clipping
IDSs can detect attacks from:
1) external connection attempts,
2) execution of malicious code,
3) unauthorized access attempts to controlled objects.
The document Ethics and the Internet was issued as RFC 1087 by the ____ ____ ____
Internet Advisory Board
CESAR Cipher is a ________ CIPHER
SUBSTITUTION
Block Cipher: Operate on __________and apply the encryption algorithm to the __________message block.
CHUNKS, ENTIRE
Used by most modern encryption algorithms used BLOCK.
Substitution Cipher: Replace with a different ________.
Character
Stream Ciphers: Operate on ____ bit or character at a time.
ONE
ONE TIME Ciphers are ______CIPHERS…
STREAM
A _______ is a system that hides the true meaning of a message. This uses a variety of
techniques to alter and/or rearrange the characters or words of a message to achieve
confidentiality….
Cipher
CIPHER provides ____________
Confidentiality
CFB vs CBC: Cipher Feedback Mode (CFB) uses a _________ cipher, compared to CBC’s block cipher.
streaming
Cipher Feedback (CFB): A mode in which the DES algorithm is used to encrypt the
preceding block of cipher text. This block is then XORed with the _________block of plain text
to produce the next block of cipher text….C F B uses a STREAMING cipher..
Next
Hint CFB is “NEXT”
Cipher Block Chaining (CBC): A process in which each block of unencrypted text is
XORed with the block of cipher text immediately preceding it before it is encrypted using
the DES algorithm…
In Cipher Block Chaining (CBC) mode, each block of unencrypted text is XORed with the block of cipher text immediately __________it before it is encrypted using the DES algorithm.
preceding
TCP IP Handshake
SYN
SYN/ACK
ACK
Provides daily updates on fires
N I F C provides daily updates on fire
This attacks the three-way handshake process used by TCP/IP to initiate communication sessions
SYN Flood Attack
AGILE Software Development prefers being FLEXIBLE as opposed to following a _____
Plan
Auxiliary alarm systems facilitate local, remote, and centralized alarm systems by notifying external sources (police, fire, and medical) of signifying events…
AUXILARY ALARMS will notify ______Sources…
EXTERNAL
A _______ is a form of gate that prevents more than one person at a time from gaining entry and often restricts movement in one direction.
turnstile
RSA is an example of __________cryptography, which does not require a preexisting relationship to provide a secure mechanism for data exchange. Two individuals can begin communicating securely from the moment they start communicating…
asymmetric
RSA does not have a _________ relationship and can start communications quickly…
pre existing
3 Common forms of Governance:
1) IT …2) CORPORATE…3) SECURITY..
_________ is the periodic examination and review of a network to ensure that it meets security and regulatory compliance..
Auditing