- __________ relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to. Social engineering
- A __________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media. network sniffer
- A birthday attack is a type of logic bomb virus that releases its payload on some famous person’s birthday, such as Michelangelo. False
- a concept that complements the idea of various layers of security Diversity of defense
- A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment MAC Address
- A port number is a way to identify a specific computer to which an Internet or other network message is to be forwarded. False
- A protocol defines a number of agreed-upon parameters, such as the data compression method, the type of error checking to use, and mechanisms for systems to signal when they have finished either receiving or transmitting data. True
- A security professional must understand how the various TCP/IP protocols operate True
- another name for the boundary around a system where external inputs can interact with a system attack surface
- Another term for defense in depth is layered security. True
- are “dumb” devices that pass on anything received on one connection to all other connections Hubs
- are logical boundaries the surround specific levels of trust in a system Trust boundaries
- attempts to ensure that an individual is who they claim to be. Authentication
- Context-based signatures match a pattern of activity based on the other activity around it, such as a port scan True
- deals with the ability to verify that a message has been sent and received and that the sender can be identified and verified. Nonrepudiation
- deals with the generation and modification of data. Only authorized individuals should ever be able to create or change (or delete) information. Integrity
- Defense in depth layered security
- Deny access by default, and grant access only when explicit permission exists Default deny
- described as always using simple solutions when available
Protection mechanism should be small and simple Economy of mechanism - Encapsulation is the concept of separating items so that they cannot interfere with each other. False
- ensures that only those individuals who have the authority to view a piece of information may do so. Confidentiality
- ensures that people entering a vault have prior authorization Access control
- ensures that the data, or the system itself, is available for use when the authorized user wants it. Availability
- holds that the protection of an object should not rely upon secrecy of the protection mechanism itself Open design
- Hostile activity that does not match an IDS signature and goes undetected is called a false positive. False
- Implicit deny applies to situations involving both authorization and access. True
- In a __________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network. Smurf
- In most security circles, security through obscurity is considered a good approach, especially if it is the only approach to security. False
- In the OSI reference model, the communications between a computing system are split into seven different abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
- is a concept that when something fails, it should do so to a safe state Fail-safe defaults
- is a numerical label assigned to each device connected to a computer network that uses the ___ for communication IP Address
- is a principle that is characterized by the use of multiple, different defense mechanisms with a goal of improving the defensive response to an attack (2 factor authorization) Defense in depth
- is a router interface connected to the local network that sends packets out of the local network GateWay
- is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. The range is from 0 to 65535 Port Number
- is considered effective if the environment and protection mechanisms are confusing or thought to be not generally known Security through obscurity
- is having an understanding of how a party will react to a given stimulus Trust
- is the application of separation of privilege to the people side of the security function
More than one people should be involved Separation of duties - is when a higher-level protocol carries a lower level protocol the lower protocol is encapsulation in the data portion of the higher protocol Encapsulation
- Johnny receives a “new version” of the game Solitaire in an e-mail. After running the program, a backdoor is installed on his computer without his knowledge. What kind of an attack is this? Trojan
- Making data look like it has come from a different source is called __________. Spoofing
- means separating items so that they cannot interfere with each other Isolation
- Most networks are dominated by Ethernet and Internet Protocol True
- Packet fragmentation is the splitting of a packet while in transit into two packets so that they can get past an MTU bottleneck. True
- Port Number for HTTP 80
- Port Number for HTTPS 443
- refers to the concept that each and every request should be verified Complete mediation
- refers to the users’ acceptance of security measures Psychological acceptability
- refers to whether a control can be verified to be functioning properly. Auditability
- RST gracefully terminates the connection and FIN abruptly tells the other side to stop communicating. False
- states that a protection mechanism should be constructed so that it uses more than one piece of information to make access decisions. Separation of privilege
- states that mechanisms used to access resources should be dedicated and not shared (VMs) Least common mechanism
- Subject (user, application, or process) should have only the necessary rights and privileges to perform its task with no additional permissions. Least privilege
- Switches are essentially small computers that perform a variety of intelligent tasks. False
- SYN flooding is an example of a _______ denial-of-service attack
- TCP is a connectionless protocol. False
- The gateway address (or default gateway) is a switch interface connected to the local network that sends packets out of the local network. False
- The misuse detection IDS model is more difficult to implement than the anomaly detection model false
- The NIDS signature database is usually much larger than that of a host-based system True
- The ping of death is a type of man-in-the-middle attack False
- The term __________ refers to software that has been designed for some nefarious purpose. Malware
- Traffic that is encrypted will typically pass by an intrusion prevention system untouched. True
- UDP uses a three-way handshake to establish connections. False
- Using Transport Layer Security (TLS) is a guarantee of security. False
- What is a security issue with Common Gateway Interface (CGI)? CGI scripts that are poorly written can cause unintended consequences at runtime.
- What is an advantage of a host-based IDS? It can reduce false-positive rates.
- What is an advantage of a network-based IDS? An IDS coverage requires fewer systems.
- What is one difference between the misuse and anomaly IDS models? Anomaly models require knowledge of normal activity, whereas misuse models do not.
- What is one of the most fundamental principles in security? Least privilege
- What is the correct sequence of the three-way handshake? SYN, SYN/ACK, ACK
- What is the goal of TCP? To send an unauthenticated, error-free stream of information between two computers.
- What security design principle states that secrecy itself cannot be relied upon as a means of protection? Open design
- What term refers to a piece of code that sits dormant for a period of time until some event invokes its malicious payload? Logic bomb
- What type of software records and reports activities of the user (typically without their knowledge)? Spyware
- Which attack is the most common exploit used to hack into software? Buffer overflow
- Which attack works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections? SSL stripping attack
- Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity stored in the signature database? Analysis engine
- Which of the following is a valid IP address? 12.12.12.12
- Which of the following is an example of a MAC address? 00:07:e9:c8:ff:00
- Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers? HTTP
- Which security concept uses the approach of protecting something by hiding it? Security through obscurity
- Which security principle is characterized by the use of multiple, different defense mechanisms with a goal of improving the defensive response to an attack? Defense in depth
- Which security principle is described as always using simple solutions when available? Economy of mechanism
- Which security principle refers to the concept that each and every request should be verified? Complete mediation
- Which security principle states that access should be based on more than one item? Separation of privilege
- Which security principle states that if you have not specifically been allowed access, then it should be denied? Implicit deny
- Which statement describes the main difference between TCP and UDP packets? TCP packets are connection oriented, whereas UPD packets are connectionless.
- Which statement describes the primary purpose of JavaScript? The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.
- Which term defines a collection of predefined activity patterns that have already been identified and categorized—patterns that typically indicate suspicious or malicious activity? Signature database
- Which term is a means of signing an ActiveX control so that a user can judge trust based on the control’s creator? Authenticode
- Which term is used when separation of privilege is applied to people? Separation of duties
- Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality? Rootkit
- Which term refers to a repository of alarms that an IDS has recorded? Alarm storage
- Which term refers to making different layers of security dissimilar so that even if attackers know how to get through a system that comprises one layer, they may not know how to get through a different type of layer that employs a different system for security? Diversity of defense
- Which term refers to the invocation of conditions that fall outside the normal sequence of operation? Exceptions
- Which tool has been the de facto standard IDS engine since its creation in 1998? Snort
Other Links:
See other websites for quiz:
Check on QUIZLET