click below
click below
Normal Size Small Size show me how
final
| Question | Answer |
|---|---|
| The ICMP protocol is designed to | Check and report on network error conditions |
| Possible to capture packets from the network that are not destined for your machine? | True [Promiscuous Mode] |
| Authorization means | Using your confirmed identity to assign access rights |
| During a packet capture you notice TCP packets with "F" and "A" flags, what is going on? | A TCP/IP session shutdown process |
| The loss or omission of any security goal is | A compromise |
| If you run password crackers or packet sniffers at work, what is most important? | You must have permission from management before proceeding |
| Packet sniffing is a form of | passive reconaissance |
| The data ______ is the person have responsibility and authority for the data | Owner |
| The data ______ is the person temporarily accessing and/or modifying the data | Custodian |
| The term no tech hacking refers to | Methods used by a hacker to obtain information without the use of technology |
| What are the security goals? | Security, Functionality, Ease of Use |
| What is the CIA Triad? | Confidentiality, Integrity, Availability |
| What part of a packet can you examine when using a packet sniffer? | All of it |
| You receive a few SYN packets, followed by RST, but no ACK packets. What happened? | SYN Stealth open port scan from NMAP |
| Security policies should be written while keeping in mind | Information, People, Assets |
| In the CIA Triad, _____ is responsible for ensuring that legitimate users maintain access to information and resources they need access to | Availability |
| In terms of security, social engineering is | non technical ahcking |
| A _______ attaches itself to a program or file so it can spread from one computer to another with the file as it travels, leaving infections as it travels | Virus |
| A man in the middle attack exploits a _____ between computers | Trust relationship |
| In security, Authorization means | Using your identity to assign access rights |
| The TCP three-way handshake used to open a TCP connection uses 3 packets. What 2 flags are required to be set across these 3 packets? | SYN, ACK |
| What is an effective vulnerability scanner? | Nessus |
| What will a closed port respond to a SYN packet with? | RST Packet |
| A tries to open TCP session with B. A's initial sequence number is 123, B will respond with | It's own initial sequence number and an acknowledgement number of 124 |
| From the perspective of risk management, security is | Reducing / minimizing the risks to the organization and its assets to an acceptable level |
| The loss of one of the goals of security through an incident is known as | A Compromise |
| A fragmented IP Datagram can only be reassembled by | the host it is destined for |
| ______ is designed as a connectionless protocol | UDP |
| Each TCP conenction on a given system can be uniquely identified by | Source and Destination Port and IP |
| _____ spread from computer to computer, has the ability to travel and replication itself without any user intervention | Worm |
| What is a threat? | Something that could cause a security issue if allowed to get in, can't do anything with a vulnerability to get in, external to system but may be internal to security environment |
| What is a vulnerability? | Potential security hole that may exist and needs to be fixed to ensure it isn't exploited by a threat. So long as it exists, a compromise exists. Internal to system/security environment. |
| What is active reconassiance? | The goal is to gather more direct information while remaining unseen. Improve on passive recon while still treading lightly. Visibility becomes a possibility at this level. |
| Name some examples of active reconaissance | scanning to find systems and vulnerabilities, searching for non-public, protected or privileged information, system profiling, hacking, social engineering |
| What is the concept of least privileges? | Every security object (user, process, etc) should only be assigned the MINIMUM PERMISSIONS required to be able to accomplish it's assigned tasks |
| What are the 3 main types of security? | 1. System security: Protection of information and services on a system. 2. Communication Security, protection of information while it's being transmitted. 3. Physical security: protection from physical access to computer, facilities |
| Why is physical security necessary? | If the enemy has access to the hardware they can use a much broader set of skills and tools to breach any security. |
| What vulnerability is hardest to secure against? | The human element |
| In security, authentication is | confirming your identity with an element unique to the individual |
| What is the optimal information security strategy? | Defense in Depth |
| Which of the CIA Triad elements are responsible for ensuring that personal information is not disclosed to unauthorized users? | Confidentiality |
| _____ reconaissance is used by hackers for observing and learning about the target from afar | Passive |
| _____ reconaissance is used by hackers to gain more direct knowledge of the target | Active |
| The TCP Three-way handshake used to close a TCP connection uses 3 packets. What 2 flags are required to be set across these 3 packets? | FIN, ACK |
| How can you determine what O/S a company is using? | You can't |
| No tech hacking refers to | acquiring technical information without the need for technical tools |
| A weakness in a computer system, or a point where the system is susceptible to attack is | A vulnerability |
| In order for a packet sniffer to work properly, it needs to put the NIC card into what mode? | Promiscuous |
| Which TCP/IP layer is concerned with physically moving electrons across a wire? | Physical |
| _____ is a connection protocol? | UDP |
| Are natural disasters considered a threat to security? | Yes |
| How to break codes and ciphers | Cryptoanalysis |
| What is SIGINT? | Signal intelligence |
| What is COMINT? | Communications Intelligence (between people) |
| What is ELINT? | Electronic Intelligence (radar) |
| What is DES? | Data Encryption Standard |
| What is AES | Advanced Encryption Standard |
| What is a block cipher? | Algorithm - takes fixed-length |
| How many rounds of functions does DES go through? | 16 |
| What is the study of cipher systems? | Cryptography |
| What is the mechanism that encrypts and decrypts | Cipher |
| What is a KPA? | Known Plaintext Attack - attacker has samples of plaintext and it's encrypted version |
| What is CPA? | Chosen Plaintext Attack - attacker has ability to choose a plaintext to be encrypted and obtain the ciphertext |
| What is COA? | Ciphertext Only Attack - Attacker only has access to set of ciphertexts |
| What is CCA? | Chosen Ciptertext Attack - attacker has ability to choose a ciphertext and obtain its decryption under an unknown key |
| What is a Chosen Key attack? | Attacker has the ability to use a ciphertext and attack with random keys until a message is gained. |
| What is a symmetric encryption? | Uses 1 shared secret key to encrypt/decrypt |
| What is asymmetric encryption? | Uses 2 keys; 1 private, 1 shared. |
| What is a hash function? | Makes data of arbitrary size to hashed data of fixed size. Slight change in input makes large changed in output. Used for data validation. |
| How does 3DES work? | Encrypt with Key A, Decrypt with Key B, Encrypt with Key C |
| What is ROT13? | Move letters 13 down the alphabet |
| What is substitution | Alters letters with others, A = J, etc |
| When did DES become broken? | 1999 |
| What is the advantage of quantum cryptography? | You can detect if someone is intercepting messages |
| What is a PKI? | Public Key Infrastructure. A way to distribute public keys using a trusted 3rd party (certificate authority) |
| What type of VPN would a telecommuter use? | Remote access VPN, uses application software on computer |
| What type of VPN would a remote office use? | Site to Site VPN, uses VPN Routers |
| Difference between IPSec VPN and SSL VPN? | IPSec = application, SSL = web browser |
| IDS vs IPS? | IDS monitors traffic (passive), IPS takes immediate actions (active) |
| What is steganography? | Concealing data in a carrier medium |
| Steganography: Injection? | Data in usused part of file |
| Steganography: Data Substituion? | Non-critical data is replaced |
| 0th byte of IPv6 header (1st and 2nd number) | Version and IHL |
| 1st byte of IP header (3rd & 4th number) | TOS |
| Second and Third byte of IP header (5th, 6th, 7th, 8th number) | Total Length |
| Fourth and fifth byte of IP header (9th-12th numbers) | ID |
| 6th byte of IP header (13th number) | IP Flag |
| 6th through 7th byte (14th-16th number) | Fragment Offset |
| 8th byte of IP header (17th and 18th number) | TTL |
| 9th byte (19th and 20th number) | PROTOCOL [IMPORTANT] |
| What is protocol 1? | ICMP |
| What is protocol 6? | TCP |
| What is protocol 17? | UDP |