Term
| Describe three traits of Stream Cipher. |
|
Definition
1. Uses Symmetric Encryption
2. It is fast
3. Ciphertext is the same size as the original text. |
|
|
Term
| Describe three traits of Block Cipher. |
|
Definition
1. ECB (Electronic Code Book)
2. CBC (Cipher Block Chaining)
3. Block Encryption |
|
|
Term
| What does HIDS stand for and what is its purpose? |
|
Definition
| A Host Intrusion Detection System (HIDS) is an Intrusion Detection System (IDS) technology that monitors a host on a network to determine whether that host has been attacked by a hacker. |
|
|
Term
| What is a Production Honeypot? |
|
Definition
| It is a comptuer system that is designed to divert hackers from network resources. |
|
|
Term
| What is a Research Honeypot? |
|
Definition
| It is a computer system designed to enable researchers to study the methods that hackers use to infiltrate a computer network or computer system. |
|
|
Term
|
Definition
| A Log File Monitor (LFM) is an Intrusion Detection System (IDS) technology that reads log files to determine whether a network is undergoing a hacker attack. |
|
|
Term
|
Definition
| Microsoft Terminal Services |
|
|
Term
| What is an agent that copies itself when it runs? |
|
Definition
|
|
Term
|
Definition
| Virtual Network Computer is an open-source application that enables users to remotely control computers. |
|
|
Term
|
Definition
A Denial of Service attack that takes advantage of the TCP "three way handshake" protocol. A SYN is a type of TCP packet sent to initiate a connection with a listening TCP port.
A SYN flood occurs when one or more listening TCP ports are sent large numbers of SYN packets. |
|
|
Term
| What is the best way to protect a subnet? |
|
Definition
| Policy based access lists on routers. |
|
|
Term
| How does a "buffer overflow" occur? |
|
Definition
| This occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. The extra data can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. |
|
|
Term
| What is needed for all evidence? |
|
Definition
| The chain of custody must be preserved. |
|
|
Term
| What three things must be done for a proven chain of custody to occur? |
|
Definition
1. The evidence is accounted for at all times.
2. The passage of evidence from one party to the next is fully documented.
3. The passage of evidence from one location to the next is fully documented. |
|
|
Term
| What is a Teardrop attack? |
|
Definition
This targets a vulnerability in the way fragmented IP packets are re-assembled.
In this attack, packet fragments are deliberately fabricated with overlapping offset fields, causing the host to hang or crash when it tries to re-assemble them. |
|
|
Term
|
Definition
| The process of accumilating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment. It can reveal system vulnerabilities and improve the ease with which they can be exploited. |
|
|
Term
|
Definition
| Microsoft Base Security Analyzer (MBSA) provides a streamlined method of identifying common security misconfigurations. |
|
|
Term
| An administrator notices that an e-mail server is currently relaying e-mail (including spam) for an e-mail server reqeusting relaying. Upon further investigation the administrator notices the existance of /ect/mailrelay domains. What modifications shoul |
|
Definition
| Delete the S entry in the relay domains file and restart the e-mail process. |
|
|
Term
|
Definition
| The process of putting one packet inside another, usually encapsulating ordinary (non-secure) IP packets inside of encrypted (secure) IP packets. |
|
|
Term
| How does a hacker best find out what services are running on a device? |
|
Definition
|
|
Term
| What is the name for the patterns that intrusion dectection systems look for? |
|
Definition
|
|
Term
| How can you prevent IP spoofing? |
|
Definition
| Have your DNS do reverse lookup's. |
|
|
Term
| What is the most granular form of access control? |
|
Definition
| ACL's (Access Control Lists) |
|
|
Term
| What changes in the configuration should you make after the install of a new OS? |
|
Definition
| Rename the admin and guest accounts. |
|
|
Term
| What is the type of secure connection between a company's main office and branch that occursover a public network? |
|
Definition
|
|
Term
| What is the best way to protect users passwords? |
|
Definition
|
|
Term
| What are the three programming components of WAP (Wireless Application Protocol)? |
|
Definition
Origin Server
Gateway
Client |
|
|
Term
What are the dangers of a malformed MIME (Multipurpose Internet Mail Extensions)?
List four. |
|
Definition
1. It can create a backdoor.
2. It can contain a virus.
3. It can cause an unauthroized disclosure of private information.
4. It can cause an e-mail server to crash. |
|
|
Term
|
Definition
| Malicious code installed on a server that e-mails keystrokes to the author and deletes the systems logs at backup. |
|
|
Term
| What is able to distribute itself without the hosts files? |
|
Definition
|
|
Term
| Digital signatures can be used for what purpose? |
|
Definition
|
|
Term
| What is the weakest link of security? |
|
Definition
|
|
Term
| What must occur in order for logging to be effective? |
|
Definition
| You must review the logs regularly. |
|
|
Term
|
Definition
Access Control
Authentication
Auditing |
|
|
Term
|
Definition
Confidentiality
Integrity
Availability |
|
|
Term
|
Definition
| A policy, software component, or hardware component that is used to grant or deny access to a resource. |
|
|
Term
|
Definition
| The process used to verify that a machine or user attempting access to the networks or resources is, in fact, the entity being presented. |
|
|
Term
|
Definition
| The process of tracking events, errors, access, and authentication attempts on a system. |
|
|
Term
| What was originally designed to decrease broadcast traffic and to be beneficial in copmromising sniffers? |
|
Definition
|
|
Term
| What may be needed when a stored key and a password are not strong enough authentication? |
|
Definition
| multifactor authentication |
|
|
Term
| An FTP server is usually located where on the network? |
|
Definition
|
|
Term
| What are the four major components of ISAKMP (Internet Security Association and Key Management Protocol)? |
|
Definition
Authentication of peers
Threat management
Security Association creation and management
Cryptographic key establishment and management |
|
|
Term
| What privledges does Active X use? |
|
Definition
| Those of the current user. |
|
|
Term
| What kind of attacks are hashed passwords vulnerable to? |
|
Definition
| Dictionary or brute force attacks. |
|
|
Term
| What is the definition of a Honeypot? |
|
Definition
| A decoy to attact and collect information on intruders. |
|
|
Term
| What is the first process to resume when returning to the original site, following a disaster? |
|
Definition
| The least critical process. |
|
|
Term
| Documenting change levels and revisions is most useful for what? |
|
Definition
|
|
Term
| Controlling access to IS (information system) networks is neccessary to preserve what three things? |
|
Definition
CIA
Confidentiatlity
Integrity
Availability |
|
|
Term
| What is the name of the collection of information that includes login, file access, and whether it was attempted, legitimate, or unauthorized? |
|
Definition
|
|
Term
| What are three vulnerabilities of FTP (File Transfer Protocol)? |
|
Definition
Clear text passwords
Anonymous logins
Possible collection/distribution points for unlicensed software |
|
|
Term
| What is true when comparing a virus to a hoax? |
|
Definition
| A hoax does just as much damage as a real virus. |
|
|
Term
| What is the greates benefit to S/MIME (Secure Multipurpose Internet Mail Extensions)? |
|
Definition
| Encrypting and signing e-mail. |
|
|
Term
| What is privledge escalation? |
|
Definition
| An attack where a user exploits a bug in an application to gain access to resources which would normally have been protected from an appplication or user. The result is that the application performs actions with a higher security context than intended by the application developer or administrator. |
|
|
Term
| Which access control is based on the responsibility the user has in an organization? |
|
Definition
| RBAC (Role-based access control) |
|
|
Term
| What are the four layers of WAP (Wireless Application Protocol)? |
|
Definition
Wireless Application Environment (WAE)
Wireless Session Layer (WSL)
Wireless Transport Layer Security (WTLS)
Wireless Transport Layer (WTP) |
|
|
Term
|
Definition
| The use of a software application in conjunction with a modem to penetrate the modem-based systems of an organization by continually dialing in. |
|
|
Term
| What results in DNS resolving the wrong IP and causing misdirection? |
|
Definition
|
|
Term
| What is the purpose of a Certificate Policy? |
|
Definition
| It determines what information a digital certificate will contain. |
|
|
Term
|
Definition
| Policies and procedures intended to reduce the likelihood of damage or injury. |
|
|
Term
|
Definition
| Wireless Transport Layer Security (WTLS) is the security layer of WAP (Wireless Application Protocol). |
|
|
Term
|
Definition
| The inability to deny that they performed an action on a block of data. |
|
|
Term
|
Definition
| It protects email with PK and encryption. |
|
|
Term
|
Definition
| When a machine sends a ping (echo request) to several machines disguising itself as another machine in the source field of the echo request. The machines reply back to the incorrect source and flood the machinewith ping requests it never asked for. |
|
|
Term
| Define "seperation of duties". |
|
Definition
| Requires that for particular sets of transactions, no single individual be allowed to execute all transactions within the set. |
|
|
Term
| What is a "Ping of Death" attack? |
|
Definition
| A denial of service (DOS) attack caused by an attacker deliberately sending an IP packet larger than 65,536 bytes allowed by the IP protocol. |
|
|
Term
|
Definition
| GOST is a Russian private key encryption standard that uses a 256-bit encryption key. GOST was developed asa counter to the Data Encyrption Standard (DES). |
|
|
Term
|
Definition
| A private encyrption standard that is used in Pretty Good Pivacy (PHP). |
|
|
Term
| What is IDEA (International Data Encyrption Algorithm)? |
|
Definition
| A private key encryption standard that was developed in Switzerland. IDEA is used in PGP and uses 128-bit encryption keys. |
|
|
Term
|
Definition
| A private key encryption standard that was developed at the Massachusetts Institute of Technology (MIT). RC5 supports varialbe length encryption keys. |
|
|
Term
| What is a POP (Point of Presence)? |
|
Definition
| The equipment in a telephone company central office (CO) that connects an ISP to the digital communications network. |
|
|
Term
|
Definition
| The network media that connects a customer to a telephone company central office. |
|
|
Term
| What is a digital signature? |
|
Definition
| An encrypted checksum that is sent with a file that can be used to verify if a file was changed during transit. |
|
|
Term
| What is an SIV (System Integrity Verifier)? |
|
Definition
| It is an IDS (Intrusion Detection System) that examines critical system files for modifications. |
|
|
Term
| In a PKI (Public Key Infastructure) what is is the device that can be used to sign certificates known as? |
|
Definition
|
|
Term
|
Definition
| A public key that has been verified and is trusted to sign digital certificates. |
|
|
Term
| In a PKI (Public Key Infastructure) what is the definition of an issuer? |
|
Definition
| An entity that signs certificates provided by a subject. |
|
|
Term
| In a PKI (Public Key Infastructure) what is the definition of a relying partner or a verifier? |
|
Definition
| An entity that verifies a certificate chain. |
|
|
Term
| In a PKI (Public Key Infastructure) what is the definition of a target? |
|
Definition
|
|
Term
| What is the 3 byte MAC prefix for Cisco NICS? |
|
Definition
|
|
Term
| What does the AS (Authentication Service) do in Kerberos 5? |
|
Definition
| Authenticates users and providers with a Ticket Granting Ticket (TGT). |
|
|