TestOut Security Pro // CompTIA Security+ – Flashcards

Unlock all answers in this set

Unlock answers
question
Access Control
answer
The ability to permit or deny the privileges that users have when accessing resources on a network or computer.
question
What are the three entities of access control?
answer
Objects, subjects and system.
question
Access Control Object
answer
Data, applications, systems, networks and physical space.
question
Access Control Subjects
answer
Users, applications or processes that need access to an object.
question
Access Control System
answer
The access control system includes the policies, procedures, and technologies, that're implemented to control a subject's access to an object.
question
Access Control Identification
answer
Identifies the subject. Examples include a username or a user ID number.
question
Access Control Authentication
answer
The process of validating a subject's identity. It includes the identification process, the user providing input to prove identity, and the system accepting that input as valid.
question
Access Control Authorization
answer
The granting or denying a subject's access to an object based on the level of permissions or the actions allowed on the object.
question
Access Control Auditing (or Access Control Accounting)
answer
Maintaining a record of a subject's activity within the information system.
question
The AAA of Access Control
answer
Authentication. authorization and auditing.
question
Access Control Policy
answer
Defines the steps & measures that are taken to control access to objects by subjects.
question
Preventive Access Control
answer
Deter intrusion or attacks.
question
Detective Access Control
answer
Search for details about the attack or the attacker
question
Corrective Access Control
answer
Implement short-term repairs to restore basic functionality following an attack
question
Deterrent Access Control
answer
Discourage continued or escalations of attacks during an attack
question
Recovery Access Control
answer
Restore the system to normal operations after the attack and short-term stabilization period.
question
Compensative Access Control
answer
Alternatives to primary access controls
question
Administrive Access Control
answer
Policies that describe accepted practices.
question
Technical Access Control
answer
Computer Mechanisms that restrict access.
question
Physical Access Control
answer
Restricts physical access
question
Directory Service
answer
Example of a technical access control system that you use to manage and enforce access control policies.
question
Mandatory Access Control (MAC)
answer
MAC uses labels or attributes for both subjects and objects. Any operation by any subject on any object will be tested against a set of authorization rules to determine if the operation is allowed.
question
MAC Classification Labels
answer
Assigned to objects by the owner
question
MAC Clearance Labels
answer
Assigned to subjects
question
Flat File Database
answer
Unstructured, local user accounts.
question
Hierarchical Database
answer
Allows you to sort and organize your user accounts by location, function and department. Allows you to replicate it.
question
What are three advantages of Hierarchical Databases?
answer
Organization, delegation of administrator responsibilities, and replication.
question
Active Directory
answer
A directory service that uses a hierarchical database to store user accounts.
question
Category 1 Active Directory Objects
answer
Resources. (They can represent network resources, like printers.)
question
Category 2 Active Directory Objects
answer
Security Principals, including users, computers and groups.
question
Active Directory Object Attributes
answer
Every active directory object has attributes that're populated with values.
question
Directory Schema
answer
A list of attributes. Attributes from these lists are glued together to compose an object.
question
Containment Rules
answer
What types of objects can reside within other objects?
question
Organizational Unit (OU)
answer
Objects within a single domain being organized into OU's.
question
AD Domain
answer
Objects are grouped together into a domain, usually denoted by a triangle. Domains are identified by their DNS Namespace.
question
Tree
answer
A collection of one or more domains that exsist within the same DNS Namespace.
question
Transitive Two-Way Trusts
answer
Lets us have other users over
question
Forests
answer
A collection of trees that share a common global catalog and a common directory schema.
question
SAMAccountName
answer
You can have users with the exact same names, as long as they're in different domains.
question
SAM Account Name
answer
Every user needs a unique name.
question
Domain Controllers
answer
Holds a copy of the Active Directory database.
question
Member servers
answer
When a server joins the Active Directory domain, it becomes a member, but it doesn't have a copy of the domain database.
question
Symmetric-Key Encryption
answer
A form of cryptography that provides confidentiality with a weak form of authentication or integrity. It uses only one key to encrypt & decrypt data.
question
Out-of-Band Distribution
answer
Involves manually distributing the key.
question
In-Band Distribution
answer
Uses mechanisms such as the following to distribute the key: Use of a key distribution algorithm or Asymmetric technology to encrypt key for distribution
question
Key Space
answer
Typically short, ranging from 56-bits to 512-bits.
question
Block cipher
answer
Encrypts by transposing plain text in chunks (block-by-block). Fast; Process large amounts of data.
question
Round
answer
Data going through one substitution and transposition process.
question
IV
answer
Initialization Vector
question
Stream ciphers
answer
Encryption is performed on each bit within the stream in real time. Slow; Process small amounts of data.
question
Keystream
answer
A sequence of bits which is used for encryption.
question
Keystream Generator
answer
Produces long streams of bits with no patterns.
question
RC4 (aka Ron's Code v4 or Ron's Cipher v4.)
answer
The most frequently used symmetric-key stream ciphers. 256bit & is used with WEP and SSL. Uses KSA and PRGA.
question
Basic Encoding Rules (BER)
answer
Original rules for encoding abstract info into a concrete data stream. Specifies a set of self-identifying & self-delimiting schemes which allow each data value to be identified, extracted & decoded individually.
question
IV
answer
Initialization Vector
question
RC4
answer
Ron's Code v4 or Ron's Cipher v4
question
BER
answer
Basic Encoding Rules
question
RC2
answer
Ron's Code v2 or Ron's Cipher v2
question
RC5
answer
Ron's Code v5 or Ron's Cipher v5
question
IDEA
answer
International Data Encryption Algorithm
question
PGP
answer
Pretty Good Privacy
question
PES
answer
Proposed Encryption Standard
question
DES
answer
Data Encryption Standard
question
ECB
answer
Electronic Code Book
question
CBC
answer
Cipher Block Chaining
question
OFB
answer
Output Feedback
question
CFB
answer
Cipher Feedback
question
3DES
answer
Triple DES
question
AES
answer
Advanced Encryption Standard
question
ARM
answer
Advanced RISC Machine
question
WPA2
answer
WiFi Protected Access 2
question
HMAC
answer
Keyed-hash Message Authentication Code
question
Hash
answer
A function that takes a variable-length string, compresses it and transforms it into a fixed-length value.
question
MD5
answer
Developed by RSA. Generates 128 bits.
question
SHA-1
answer
Developed by NIST and NSA. Generates 160 bits.
question
RIPEMD
answer
Developed by COSIC. Generates 128, 160, 256, or 320 bits.
question
File Integrity
answer
The downloaded file is complete, not corrupted whilst downloading, same as original and not virus-ridden.
question
Secure logon credential exchange
answer
The password is used as the key to perform a hash on a challenge text value, and only the hashed value is passed... not the password. The receiving host use the same method to compare.
question
High Amplification or The Avalanche Effect
answer
A small change in the message results in a big change in the hashed value.
question
Collision
answer
Two different messages produce the same hash value.
question
Collision Resistance
answer
A hash algorithm's ability to avoid the same output from two guessed inputs.
question
Birthday Attack
answer
A brute force attack where the attacked hashes messages until one with the same hash is found.
question
OSI Model
answer
Open Systems Interconnection is a theoretical, 7-layer construct to explain how networking works.
question
Physical (Layer 1)
answer
Sets standards for sending and receiving electrical signals between devices.
question
Data Link (Layer 2)
answer
Defines rules and procedures for hosts as they access the Physical layer, including how multiple nodes share and coordinate the use of the same physical segment of the network.
question
Network (Layer 3)
answer
Describes how data is routed across networks and on to the destination.
question
Transport (Layer 4)
answer
TCP and UDP. Provides transition between upper and lower layers of OSI, making them transparent to each other.
question
Session (Layer 5)
answer
Manages sessions in which data is transferred.
question
Presentation (Layer 6)
answer
Presents data into compatible form.
question
Application (Layer 7)
answer
Integrates network functionality into OS. (For example: proxy firewall, gateway services, etc)
question
Network Interface Cards (NICs)
answer
Contain the MAC address and performs at Data Link layer.
question
Connection-oriented
answer
Reliable data transmissions
question
Transmission Control Protocol (TCP)
answer
Provides services that ensure accurate and timely delivery of network communications between two hosts. TCP is connection-oriented.
question
User Datagram Protocol (UDP)
answer
Provides services of network communications between two hosts. UDP is connectionless.
question
Switch
answer
Operates at Data Link layer by reading the MAC address in a frame to make forwarding decisions.
question
EIA/TIA 232
answer
serial signaling
question
V.35
answer
modem signaling
question
Cat5
answer
cable specifications
question
RJ45
answer
connector specifications
question
IPv4
answer
A 32-bit binary number between 0 and 255, represented as four octets (four 8-bit numbers.)
question
IP address
answer
Layer 3 address that is logically assigned to a host.
question
MAC address
answer
Layer 2 address that's physically assigned in the firmware of the NIC.
question
Subnet Mask
answer
32-bit number associated with each IPv4 address
question
Class A
answer
1.0.0.0 to 126.255.255.255
question
Class B
answer
128.0.0.0 to 191.255.255.255
question
Class C
answer
192.0.0.0 to 223.255.255.255
question
Class D
answer
224.0.0.0 to 239.225.225.225
question
Class E
answer
240.0.0.0 to 255.255.255.255
question
Network Address Translation (NAT)
answer
Translates multiple private addresses into the single registered IP address.
question
IPv6
answer
128-bit binary number
question
IPv6 Prefix
answer
The first 64-bits.
question
Prefix Length
answer
Identifies the number of bits in the relevant portion of the prefix
question
Interface ID
answer
The last 64-bits.
question
Virus
answer
A program that attempts to damage a computer system and replicate itself to other computer systems.
question
replication mechanism
answer
A file that the virus uses as a host.
question
activation mechanism
answer
The virus only replicates when the activation mechanism is triggered.
question
objective
answer
The virus is programmed with this, which is usually to destroy, compromise, or corrupt data.
question
Stealth Virus
answer
A virus that resides in a low-level system service functions where they intercept system requests and alter service outputs their presence.
question
Multipartite Virus
answer
A virus that is a combination of multiple attacks.
question
Macro virus
answer
A virus that takes advantage of application programs that use macros to automate repetitive functions.
question
Cryptography
answer
Process of counseling messages
question
Steganography
answer
Process of hiding messages
question
Plain Text
answer
Readable Message
question
Cipher Text
answer
Unreadable message
question
Cyptographer
answer
Person who develops a converting plan
question
Cyptanalysis
answer
Recovering original data that has been encrypted w/o key
question
Cryptosystem
answer
Associated items of cryptographic
question
Cryptology
answer
Study of cryptography and cryptanalysis
question
Key
answer
Variable in a cipher used to encrypt/decrpt a message
question
Algorithm
answer
Process or formula used to convert a message into its meaning
question
Transposition Cipher
answer
Changes the position of characters in the plain text
question
Substitution Cipher
answer
Replaces one set of characters with symbols or another character set
question
Code Substitution
answer
Hidden words with unrelated terms
question
One-time Pad
answer
Method in which the plain text is converted to binary and combined with a string of randomly generated binary numbers
question
Encryption
answer
Process of using an algorithm to transform data from plain text to cipher text
question
Decryption
answer
Procedure used to convert data from cipher text into plain text
question
Quantum Cryptography
answer
Uses a series of photons to encrypt and send messages
question
Initialization Vector
answer
Seed value used in encryption
question
Cryptanalysis Goal:
answer
Retrieve as much info as possible
question
Brute Force Attack
answer
Attacker tries every known key combination
question
Analytic Attack
answer
Exploits a structural weakness in the algorithms
question
Statistical Attack
answer
Exploits weakness in the design of a cryptosystem
question
Key Cluster Attack
answer
Occurs when different keys produce the same cuphertext
question
Man-in-the-Middle
answer
Attacker gets between two communicating parties
question
Dictionary Attack
answer
Uses known words and common variations
question
PKI Attack
answer
Attack attempts to trick a user into accepting a fake or spoofed certificate
question
Side-Channel Attack
answer
Tries to exploit information about the physical implementation f a cryptosystem
question
Authentication
answer
Users must prove that they are who they say they are
question
Password Aging
answer
Password only valid for a set time
question
Enforce Password History
answer
Remember passwords so the user can't re-use passwords
question
Enforce Password Complexity
answer
Harder passwords
question
Self Service Password Management
answer
Let the user be able to admin their passsword
question
Account Locout
answer
Disables a user account after a specified number of incorrect logon attempts
question
Account Lockout Threshold
answer
Number of incorrect logon attempts that are allowed before the account is locked
question
Account Restrictions
answer
Allow login only during certain days/hours, only from specific computers
question
Account Policies
answer
Control the composition and use of passwords
question
Not an impotent aspect of password management
answer
Enable account lockout
question
Clipping level of 9
answer
Account will be locked after 9 incorrect attempts
question
Minimum password age set to 2
answer
Users cannot change the password for 2 days.
question
Password Complexity
answer
Prevents using passwords that are easy to guess or easy to crack
question
Maximum Password Age
answer
Forces users to change the password after the specified time interval
question
Minimum Password Age
answer
Prevent users from changing passwords too soon
question
GPO
answer
Group Policy Object
question
Computer Policies also called?
answer
Machine Policies
question
Order of GPOs
answer
Local Group Policy, GPOs Linked to the domain, GPOs linked to the OU
question
GPO affects
answer
Only the location it is applied to
question
GPOs can't be linked
answer
Built-In Containers
question
Group
answer
Object that identifies a set of users with similar access needs
question
Authorization
answer
Process of controlling access to resources
question
Discretionary Access Control List
answer
DACL
question
Define Discretionary Access Control List
answer
Implementation of discretionary access control
question
System Access Control List
answer
SACL
question
Define System Access Control List
answer
Used by Microsoft for auditing to identify past actions performed by users on an object
question
Security Principal
answer
Object that can be given permission to an object
question
Effective Permissions
answer
Access rights are cumulative
question
Deny Permissions
answer
Always override Allow permissions
question
Cumulative Permissions
answer
Access to more than one entity
question
What challenges does a security professional face?
answer
Sophistication - Complication of attacks Proliferation - Volume of attacks Scale & Velocity - Size of attacks
question
What is the difference between integrity and non-repudiation?
answer
Integrity keeps the item fully in-tack and not messed with, non-repudiation always givens authentication
question
What process provides confidentiality by converting data into a form that it is unlikely to be usable by an unintended recipient?
answer
Encryption
question
What are the three main goals of the CIA of Security?
answer
Confidentiality Integrity Availability
question
Which security expression refers to verifying that someone is who they say they are?
answer
Authentication
question
What are key components of risk management?
answer
Reduce the risk for an attack
question
What are three types of threat agents?
answer
Employee Spy Hacker
question
MAC
answer
Mandatory Access Control
question
DAC
answer
Discretionary Access Control
question
RBAC
answer
Role-Based Access Control
question
RSBAC (RBAC)
answer
Rule Set-Based Access Control
question
AAA
answer
Authentication, Authorization, Accounting
question
FIM
answer
Federated Access Control
question
Object
answer
Data, application, systems, networks, physical space
question
Subjects
answer
Users, applications, processes.
question
Subject
answer
Needs access to objects
question
Identification
answer
Identifies the subject
question
Authentication
answer
Validating a subject identity
question
Authorization
answer
Granting or denying a subject access
question
Auditing
answer
Maintaining a record of a subject's activity
question
Accounting
answer
Maintaining a record of a subject's activity
question
Preventive
answer
Deter intrusion or attacks
question
Detective
answer
Search for details about the attack or the attacker
question
Corrective
answer
Implement short-term repairs to restore basic functionality following an attack
question
Deterrent
answer
Discourage continued or escalations of attacks during an attack
question
Recovery
answer
Restore the system to normal operations after the attack
question
Administrative Control
answer
Policies that describe accepted practices
question
Technical Control
answer
Computer mechanisms that restrict access
question
Physical Control
answer
Restrict physical access
question
Define Mandatory Access Control
answer
Labels or attributes for subjects and objects
question
Define Discretionary Access Control
answer
Assigns access directly to subject based on decision of the owner. Manages access using identity
question
Define Role-Based Access Control
answer
Allows access based on a role in an organization
question
Define Rule Set-Based Access Control
answer
Characteristics of objects or subjects along with rules, to restrict access
question
Authorization Table
answer
Matrix of access control objects, subjects, and their associated rights
question
Access Control Matrix
answer
Provide an interface for implementing an ACL
question
Temporal Role-Based Access
answer
TRBAC
question
Define Temporal Role-Based Access
answer
Allows for role-based access control rules to only be in effect fora certain time period
question
Non-Discretionary Access Control
answer
Prevents users from determining the read/white/execute rights for a file
question
Content Dependent Access Control
answer
CDAC
question
Define Content Dependent Access Control
answer
Protects databases that contains sensitive information from a breach of privacy
question
Context-based Access Control
answer
CBAC
question
Define Context-based Access Control
answer
Mostly used to expand the decision-making capabilities of a firewall application
question
View-based Access Control
answer
VBAC
question
Define View-based Access Control
answer
Type of constrained user interface used to control a subject's access
question
Confidentiality
answer
Keep secrets a secret
question
Integrity
answer
Ensures that information is not corrupted or altered
question
Define Federated Access Control
answer
Arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group
question
Task-Based Access Control
answer
TBAC
question
Define Task-Based Access Control
answer
Individual work tasks assign privileges
question
Star property of Bell-LaPadula
answer
No write down
question
Clark-Wilson
answer
Controlled intermediary access applications that prevent direct access to the back-end database
question
Brewer-Nash
answer
Prevent conflicts of interest by dynamically adjusting access based on current activity
question
Principle of Least Privilege
answer
Users/Groups are only given access to what they need for their job, nothing more
question
Need to Know
answer
Only allowed access if you need to know/use
question
Separation of Duties
answer
Having more than one person to complete a task
question
Implicit Deny
answer
Users are denied access unless they have been granted access
question
Explicit Deny
answer
Identifies users who are not allowed access
question
Job Rotation
answer
Staff are cross trained in different areas
question
Defense in Depth
answer
Layered defenses at each level.
question
Preventive Access Control
answer
Deter intrusion or attacks
question
Sanitization
answer
Process of cleaning a devices by having all data removed
question
Creeping privileges
answer
Escalation of privilege
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New