CISSP Security
Terms
undefined, object
copy deck
- What is a key difference in security between MAC and DAC?
- In MAC, a user who can access a file cannot necessarily copy it
- What DoD classification does MAC map to?
- Level-B classification
- What DoD classification does DAC map to?
- Level-C classification
- What does CHAP use for authentication?
- hashing
- What is AES?
- Advanced Encryption Standard- algorithm used by US government for sensitive but unclassified information
- What type of encryption is AES?
- symmetric
- What kind of algorithm is 3DES?
- symmetric
- What algorithm does AES use?
- Rijndael
- What two encryption standards is AES designed to replace?
- DES and 3DES
- What is the most effective way of enforcing security in a dialup network?
- require callback
- What port do DNS zone transfers use?
- TCP port 53
- What port do DNS lookups use?
- UDP port 53
- Why do routers help limit the damage done by sniffing and MITM attacks?
- They send data to a specific subnet only
- What are the two types of symmetric algorithms?
- block and stream
- What are the two advantages of block ciphers over stream ciphers?
- they are faster and more secure
- What is the main difference between S/MIME and PGP?
- S/MIME relies upon a CA for public key distribution
- What is the maximum throughput of 802.11a?
- 54 Mbps
- What frequency does 802.11b operate at?
- 2.4 GHz
- What is the maximum throughput of 802.11b?
- 11 Mbps
- What frequency does 802.11g operate at?
- 2.4 GHz
- What is the maximum throughput of 802.11g?
- 54 Mbps
- Is 802.11g backwards-compatible with 802.11a and 802.11b?
- backwards-compatible with 802.11b only at 11 Mbps
- What type of media access control does 802.11 use?
- collision avoidance
- What sort of attack does TACACS+'s lack of integrity checking make it vulnerable to?
- replay attacks
- What two bit strengths is SSL available in?
- 40-bit and 128-bit
- What is the maximum capacity of QIC?
- 20 GB
- What is the maximum capacity of 4mm DAT?
- 40 Gb
- What is the maximum capacity of 8mm tapes?
- 50 Gb
- What is the maximum capacity of Travan?
- 40 Gb
- What is the maximum capacity of DLT?
- 220 Gb
- With biometric scanning, what is rejecting a valid user called?
- Type I error
- With biometric scanning, what is accepting a user who should be rejected called?
- Type II error
- In biometric scanning, what is the crossover rate?
- error percentage when Type I and II errors are equal
- What mathematical fact does a birthday attack rely on?
- it is much easier to find two datasets that share a hash than to find a dataset that shares a hash with a given dataset
- What is CRL?
- Certificate Revokation list- list of subscribers to a PKI and their certificate status
- What is OCSP?
- Online Certificate Status Protocol- a replacement for CRL
- What disadvantage does CRL have the OCSP addresses?
- updates must be downloaded frequently to be accurate
- What disadvantage does CRL have that OCSP addresses?
- updates must be downloaded frequently to be accurate
- Does TLS use the same ports for encrypted and unencrypted data?
- no
- What is the difference between S-HTTP and SSL?
- S-HTTP is designed to send individual messages securely; SSL sets up a secure connection between two computers
- What is the primary limitation of symmetric cryptography?
- key distribution
- What protocol is being pushed as an open standard for IM?
- SIMPLE
- In relation to AAA, what is CIA?
- Confidentiality, Integrity, Availability
- What are the three components of AAA?
- Authentication, Authorization, Access Control
- What is an open relay?
- an SMTP relay that does not restrict access to authenticated users
- What encryption scheme does WEP use?
- RC4
- Who created RC2 and RC4?
- Rivest
- What are the two main types of firewalls?
- application-level and network-level
- How does an application-level firewall handle different protocols?
- with a proxy program for each protocol
- What happens if an application-level protocol doesn't have a proxy program for a given protocol?
- the protocol can't pass through the firewall
- What limitation do application-level firewalls create for proprietary software?
- proprietary software often uses proprietary protocols, which often can't pass the firewall
- Which is faster, application-level or network-level firewalls?
- network-level firewalls
- What are the two types of network-level firewalls?
- packet filters and stateful packet inspection
- What might be indicated by packets from an internal machine with an external source address in the header?
- machine is being used in a DoS/DDoS attack
- What is the DSS?
- Digital Signature Standard- provides for non-repudiation of messages
- Does DSS use symmetric or asymmetric keys?
- asymmetric
- What is PEM?
- Privacy Enhanced Mail- public-key encryption similar to S/MIME
- What does PGP use in place of a CA?
- a "web of trust"
- What type of encryption is Kerberos?
- symmetric
- What is X.509 used for?
- digital certificates
- What are tokens also known as?
- One-time passwords
- What type of network is extremely vulnerable to Man in the Middle attacks?
- wireless
- What is smurfing?
- broadcasting echo requests with a falsified source address, overwhelming the owner of the address
- What port does the chargen exploit use?
- TCP 19
- What port does echo use?
- port 7
- What ports does FTP use?
- ports 20 and 21
- What port does FTP use for data?
- port 20
- What port does SSH use?
- port 22
- What port does Telnet use?
- port 23
- What port does SMTP use?
- port 25
- What port does TACACS use?
- port 49
- What ports does DNS use?
- TCP and UDP 53
- What port does POP3 use?
- port 110
- What port does SNMP use?
- port 161
- What port does HTTPS use?
- TCP 443
- What port does RADIUS use?
- port 1812
- What does 802.1x do?
- provides an authentication framework for wired and wirelss networks
- What is TACACS?
- Terminal Access Controller Access Control System
- What advantage does TACACS+ have over TACACS?
- multi-factor authentication
- What protocol is replacing PPTP?
- L2TP
- What two protocols were combined to form L2TP?
- Microsoft's PPTP and Cisco's L2F
- What are the two main components of L2TP?
- L2TP Access Controller (LAC) and L2TP Network Server (LNS)
- What three utilities comprise SSH?
- SSH, Slogon, SCP
- What type of encryption does SSH use?
- RSA PKI
- What two services are provided by IPSec?
- Authentication Header (AH) and Encapsulating Security Payload (ESP)
- What encryption does S/MIME use?
- RSA
- Who developed PGP?
- Phillip R. Zimmerman
- What is PGP primarily used for?
- email encryption
- What type of encryption does PGP use?
- PKI
- What two algorithm options exist for PGP?
- RSA and Diffie-Hellman
- Are SSL sessions stateful or stateless?
- stateful
- What two strengths does SSL come in?
- 40-bit and 128-bit
- What is TLS?
- Transport-Layer Security- a successor to SSL
- What type of encryption does SSL use?
- RSA PKI
- What two layers does TLS consist of?
- TLS Record Protocol and TLS Handshake Protocol
- Are SSL and TLS compatible?
- no
- What is HTTPS?
- HTTP over SSL
- What kind of encryption does HTTPS use?
- 40-bit RC4
- What is Authenticode?
- a method of signing ActiveX controls
- What language is normally used to write CGI scripts?
- Perl
- What is DEN?
- Directory-Enabled Networking- specification for how to store network information in a central location
- What model is DEN based on?
- Common Information Model (CIM)
- What security problem does FTP have?
- authentication sent in cleartext
- What does S/FTP use for encryption?
- SSL
- What are the four WAP layers?
- Wireless Application Environment (WAE); Wireless Session Layer (WSL); Wireless Transport Layer Security (WTLS); Wireless Transport Layer (WTL)
- What is WML?
- Wireless Markup Language- used to create pages for WAP
- What OS do most PBX's use?
- UNIX
- What is hashing?
- changing a character string into a shorter fixed-length value or key
- What four trust models do PKI's fall into?
- heirarchical; network/mesh; trust list; key ring
- What is unique about the network/mesh model of PKI?
- multiple parties must be present before access to the token is granted
- Does PPTP require IP connectivity?
- yes
- Does L2TP require IP connectivity?
- no
- What does IPSec use for authentication and key exchange?
- Diffie-Hellman
- What does IPSec use for encryption?
- 40-bit DES algorithm
- What three methods are used to determine VLAN membership on the local switch?
- port-based; MAC-based; protocol-based
- What two methods are used to determine VLAN membership on a remote switch?
- implicit, based on MAC address; explicit, where the first switch adds a tag
- Why is detecting statistical anomolies a good approach to intrusion detection?
- don't have to understand the root cause of the anomolies
- What is the top priority in computer forensics?
- document each step taken
- What type of access control do most commercial OS's use?
- DAC
- How does CHAP work?
- server sends random value to client; client uses MD5 to create hash with ID, random value, and shared secret; client sends hash to server; server performs same function and compares values
- Is PPTP usually implemented through hardware or software?
- software
- Is L2TP usually implemented through hardware or software?
- hardware
- What is compulsory tunneling?
- situation where VPN server chooses the endpoint of a communication
- What advantage does compulsory tunneling provide?
- allows VPN connections to be concentrated over fewer high-capacity lines
- What port does L2TP use?
- UDP 1701
- What are the two encryption modes for IPSec?
- Transport, where only the data is encrypted; and Tunneling, where the entire packet is encrypted
- What protocol does IPSec use to exchange keys?
- Internet Key Exchange (IKE)
- What is key escrow?
- administration of a private key by a trusted third party
- What advantage does TACACS+ have over RADIUS?
- better security
- What advantage does RADIUS have over TACACS+?
- better vendor support and implementation
- What makes non-repudiation a stronger version of authentication?
- non-repudiation comes from a third party
- Non-repudiation has been compared to what real-world version of authentication?
- using a public notary
- What is a teardrop attack?
- a type of DoS attack using a false fragmentation offset value
- What is an AUP?
- Acceptable Use Policy
- From what does RSA derive its strength?
- the difficulty of factoring large numbers
- What three people were involved in the creation of RSA?
- Rivest, Shamir, Adleman
- Is RSA a public- or private-key system?
- public-key
- What is the standard key length for DES?
- 56 bits
- What is the standard key length for IDEA?
- 128 bits
- What is the standard key length for 3DES?
- 168 bits
- How are RSA and DES used together?
- RSA is used to encrypt the key for transmission; DES is used for message encryption
- What kind of encryption does AES use?
- private-key
- What is IDEA?
- International Data Encryption Algorithm- a 128-bit private-key encryption system
- What are the two most popular hashing routines in use today?
- MD5 and SHA-1
- What size is an MD5 hash?
- 128 bits
- What is MD5 designed for?
- digital signatures
- Observing the timer value in the TCP stack makes what possible?
- determining the OS in use, useful in planning attacks
- What are the three A's in computer forensics?
- Acquire, Authenticate, Analyze
- What is the first step in risk analysis?
- identifying assets
- What type of network is CHAP primarily used on?
- PPP
- What are the seven stages in a certificate life cycle?
- certificate enrollment; distribution; validation; revocation; renewal; destruction; auditing
- What security advantage do managed hubs provide over other hubs?
- they can detect physical configuration changes and report them
- What is port mirroring?
- on switches, the ability to map the input and output of one or more ports to a single port
- What does an attacker need to conduct ARP cache poisoning?
- physical connectivity to a local segment
- What security hole does RIPv1 pose?
- RIPv1 does not allow router passwords
- What are the five main services provided by firewalls?
- packet filtering; application filtering; proxy server; circuit-level; stateful inspection
- Which of the five router services do e-mail gateways provide?
- application filtering
- What OSI layer do stateful firewalls reside at?
- network layer
- What are the three types of NAT?
- static NAT; dynamic NAT; overloading NAT
- What security weakness does SPAP have?
- does not protect against remote server impersonation
- How do the RADIUS client and server avoid sending their shared secret across the network?
- shared secret is hashed and hash is sent
- In MAC, what is read-up?
- the ability of users in lower security categories to read information in higher categories
- In MAC, of read-up, read-down, write-up, and write-down, which two are legal? Which two are illegal?
- "legal- read-down, write-up
- Do hashing algorithms protect files from unauthorized viewing?
- no, only verify files have not been changed
- What is an SIV?
- System Integrity Verifier- IDS that monitors critical system files for modification
- Why are VLAN's considered broadcast domains?
- all hosts on the VLAN can broadcast to all other hosts on the VLAN
- What language are most new smart card applications written in?
- Java
- What is a bastion host?
- a gateway in a DMZ used to secure an internal network
- What type of IDS will likely detect a potential attack first? Why?
- Network-based IDS: runs in real-time
- What drawback do heuristic-based IDS's have?
- higher rate of false positives
- What are the four layers of the TCP/IP suite? How do they map to the OSI model?
- "Application > Application-Session
- What are the six steps to incident response?
- Preparation; Identification; Containment; Eradication; Recovery; Follow-Up
- What are most fire extinguishers loaded with?
- FE-36
- What is FE-13 used for?
- explosion prevention
- What is the maximum length of a valid IP datagram?
- 64K
- What is the RFC-recommended size of an IP datagram?
- 576 bytes
- What is IGMP used for?
- multicasting
- What is bytestream?
- data from Application layer is segmented into datagrams that source and destination computers will support
- What two pieces of information comprise a socket?
- source IP address and source port
- At the Network Interface layer, what is the packet of information placed on the wire known as?
- a frame
- What IP layer do man-in-the-middle attacks take place at?
- internet layer
- What IP layers do DoS attacks occur at?
- any layer
- What IP layer do SYN floods occur at?
- transport layer
- Which hashing algorithm is more secure, MD5 or SHA-1?
- SHA-1
- What is the key length for Blowfish?
- variable length
- How are digital signatures implemented?
- a hash is created and encrypted with the creator's private key
- How are asymmetric algorithms used for authentication?
- authenticator sends a random number (nonce) to receiver, who encrypts it with their private key
- In a bridge CA architecture, what is the CA that connects to a bridge CA called?
- a principal CA
- Who defines a certificate's life cycle?
- the issuing CA
- At what OSI layer (and above) must networked computers share a common protocol?
- data link and above
- What security hole does SPAP have?
- remote server can be impersonated
- What protocol does RADIUS use?
- UDP
- What protocol does TACACS+ use?
- TCP
- What sort of devices normally use TACACS?
- network infrastructure devices
- What limitation does IPSec have?
- only supports unicast transmissions
- What does IPSec require to be scaleable?
- a PKI
- What are the three major components of SSH?
- Transport Layer protocol (SSH-TRANS); User authentication protocol (SSH-USERAUTH); connection protocol (SSH-CONN)
- What do BSS and ESS stand for?
- Basic Service Set and Extended Service Set
- What does ESS offer that BSS does not?
- the ability to roam between AP's
- What are the two parts of a Key Distribution Center?
- An authentication server (AS) and a ticket-granting server (TGS)
- What are the three major classification levels with MAC?
- Top Secret; Confidential; Unclassified
- What does echo do?
- responds to packets on UDP port 7
- What does chargen do?
- responds to packets on UDP port 19 with random characters
- What is an FTP bounce?
- running scans against other computers through a vulnerable FTP server
- What version of BIND allows for mutual authentication?
- BINDv9
- What ports are commonly used for NetBIOS names and sessions?
- TCP/UDP 137, 138, 139
- What ports do DHCP and BOOTP use?
- TCP/UDP ports 67 and 68
- What port does NNTP use?
- TCP/UDP 119
- What port does LDAP use?
- TCP/UDP port 389
- What port does LDAPS use?
- TCP/UDP port 636
- Why can hand geometry only be used for verification, rather than identification?
- hand geometry is not unique
- What advantages do hand geometry scans have over fingerprint scans?
- they are faster, cleaner, and less invasive
- What are the advantages and disadvantages of retinal scanning?
- most reliable but most invasive
- What disadvantage does speech recognition have?
- easier to spoof than other biometric techniques
- What are QIC tapes primarily used for?
- backing up standalone computers
- What are DAT drives primarily used for?
- basic network backups
- What three tape types offer high capacity and rapid data transfer?
- 8mm, DLT, and LTO
- How does a host respond to a TCP connect scann if the scanned port is open? Closed?
- open: SYN-ACK; closed: RST
- What can be done to reduce the effects of half-open attacks?
- reduce the time a port waits for a response
- How does a host respond to a FIN packet if the scanned port is open? Closed?
- open: packet discarded; closed: RST
- How does an XMAS scan work?
- a variety of TCP packets are sent to elicit a response
- What TCP sequence number does an XMAS scan use?
- 0
- What are two characteristics of a null scan?
- TCP sequence number set to 0; no TCP flags set
- What is a TCP ACK scan used for?
- determining if a port is filtered by a firewall
- What is a window scan?
- a scan that attempts to determine the OS in use by its default TCP window size
- What are the two basic types of DoS attacks?
- flaw exploitation attacks and flooding attacks
- What three basic router/firewall measures will reduce the effects of a DoS attack?
- egress filtering, ingress filtering, and disabling IP-directed broadcasting
- What is source routing?
- Sender defines hops a packet must travel through
- How is source routing used by attackers?
- used to route packets around security devices
- How can source routing be defended against?
- routers can be configured to discard source-routed packets
- What two methods do IDS's use to detect and analyze attacks?
- misuse detection and anomoly detection
- What advantage does LEAP have over EAP?
- LEAP allows for mutual authentication
- What protocol does 802.1x use for authentication?
- EAP
- How does an 802.1x authenticator handle authentication traffic?
- Passes it to a RADIUS server for authentication
- What is ECC?
- Elliptical Curve Cryptography- public-key cryptographic method which generates smaller, faster, and more secure keys
- What standard is LDAP based on?
- X500
- Who developed SSL?
- Netscape
- What three protocols are routinely layered over TLS?
- IMAP, POP3, and SMTP
- What two types of certificates does S/MIME use?
- PKCS #7 certificates for message content and X.509v3 for source authentication
- What is the "hidden node" problem?
- When a wireless client cannot see the network due to interference.