• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back

What kind of language is 1's and 0's?

Machine language

What kind of language are these? C++, Ruby, Java, Visual Basic

Higher level languages

What kind of language are C, C++, Java, Fortran?

Compiled languages

What kind of language are Javascript, VBScript?

Interpreted language

What are examples of Object Oriented programming?

C++, Java, .Net

What are the 7 steps in the Systems Development Lifecycle?

1. Concept definition


2. Requirements


3. Control specifications (security)


4. Design review


5. Code review


6. UAT


7. Maintenance & Change Management

What is the Spiral lifecycle model?

Many waterfall prototypes created throughout allowing developers to return to the Planning phase.

What are the 5 levels of SW-CMM (capability maturity model) that organizations go through?

Level 1 - Initiating (disorganized)


Level 2 - Repeatable (code reuse begins)


Level 3 - Defined (formal dev processes)


Level 4 - Managed (can measure)


Level 5 - Optimizing (cont. improvement)

What are the 5 phases of the IDEAL model (organization improvement)?

1. Initiating


2. Diagnosing


3. Establishing


4. Acting


5. Learning

True or False. Change management has more to do with approvals while Configuration management has more to do with recording the facts about the change.

True

What are the 3 controls in Change Management?

Request - Change - Release

What is used to control the versions of SW and formally track all changes (doesn't deal with SLA's)?

Configuration Management

What is bringing SW development, operations and quality assurance together?

DevOps

True or False. Developers must know when to require authentication and verify credentials for every API call and when it's not necessary.

True

In SW testing, what is testing the SW for values that return results within reasonable bounds?

Reasonable check

In SW testing, what is testing the internal structures of the program and steps through the code line by line?

White box testing

In SW testing, what is testing the program from the perspective of a user?

Black box testing

In SW testing, what is testing the program from the users perspective and uses the source code to design the tests?

Gray box testing

True or False. It's ok if developers put their API keys in a public code repository.

False. Attackers have created bots looking for these keys.

What DBMS (db management system) is set up with columns and rows, is flat and 2 dimensional?

RDBMS (Relational DB Management System)

For a RDBMS with 3 rows and 8 columns, what is the cardinality/degree?

Cardinality of 3 and degree of 8

What is the unique identifier of the records in a table called?

Primary key

What links 2 tables?

Foreign key

What is a combination of column headings to determine uniqueness?

Candidate key

In the ACID model, what are db transactions that are all or nothing; both sides of the transaction succeed or neither do?

Atomicity

In the ACID model, what is it where the db goes back to its consistent state after the transaction?

Consistency

In the ACID model, what is it when transactions complete before the next one occurs?

Isolation

In the ACID model, what is it that once the transaction is committed to the db,it is preserved?

Durability

What db edit control allows only one user at a time to make a db change?

Concurrency

What is adding another row in the db (with the same primary key) to throw off anyone looking at the db?

Polyinstantiation

What are artificial intelligence and expert (accumulated knowledge of experts in a system) systems called?

Knowledge-based systems

What analyzes the information in the knowledge base of an expert system to arrive at an appropriate decision?

Inference engine

Inference engines use this 'blurred boundaries' which is based on degrees of truth? (mimics human thought)

Fuzzy logic

What are the 4 steps of fuzzy logic?

Fuzzification - Inference - Composition - Defuzzification

What imitates the human mind to estimate functions that can depend on a large number of inputs that are generally unknown? Involves many layers of weighted summations. The system goes through a training period where the network works backwards from accurate decisions using the learning rule or Deltasone rule.

Neural networks

What provides an inference engine and knowledge base for network security?

NIDES (Next Generation Intrusion Detection Expert System)

What malicious code depends on careless humans?

Viruses and Trojan Horses

What malicious code operates under its own power?

Worms

What is a malicious individual who doesn't understand the technology, but downloads ready to use SW from the internet and launches attacks?

Script kiddie

What are the 2 main functions of viruses?

Propagation and destruction

What propagation technique virus attacks the bootable portion of media (hard disk, USB drive, CD) that the computer uses to load the OS?

Master Boot Record virus (spreads through the sharing of media)

What propagation technique virus attacks executable files (.exe,. com)?

File Infector virus

What propagation technique virus is a self contained executable that escapes detection by using a similar filename?

Companion virus

What propagation technique virus infects an app like MSFT Word and causes a sequence of actions to be performed automatically when the app is started?

Macro virus (I Love You virus is a famous example)

What propagation technique virus injects itself into a trusted runtime of the OS, such as winlogin.exe and explorer.exe?

Service Injection virus

True or False. Many antivirus SW identify viruses by comparing what is found while scanning a system to signatures (characteristics) in their large virus db.

True

What are the 3 actions antivirus SW can take when it finds a virus?

Disinfect - Quarantine - Delete

What virus uses more than one propagation technique?

Multipartite virus

What virus hides itself by tampering with the OS to fool the AV SW?

Stealth virus

What virus modifies its own code as it travels from system to system?

Polymorphic virus

What virus is encrypted to avoid detection?

Encrypted virus

What is malicious code that lies dormant until triggered? (viruses and Trojan Horses contain these)

Logic bombs

What is it when a user downloads SW they think is safe, but in fact carries malicious code? (e.g. user downloads some rogue AV SW that contains malicious code which they then pay the same AV vendor to have it removed)

Trojan Horse

What worm attacked unpatched MSFT internet servers and performed 3 attacks (1. infected IP addresses it found, 2. defaced HTML pages, saying 'Hacked by Chinese', 3. planted a logic bomb that would create a DoS on the Whitehouse's homepage)

Code Red worm

What was the first virus to cause physical damage to a facility? It was looking for specific systems in hopes of triggering nuclear weapons. Rumored to have been created by the US & Israel to disable Iran's nukes.

Stuxnet

What monitors your actions and transmits them to a remote system?

Spyware

What displays advertisements on infected systems?

Adware

What is the primary countermeasure to malicious code?

Antivirus filtering SW

Where should you install AV SW?

Client systems, servers, content filters (majority of viruses are exchanged over email)

What is the difference between removing and cleaning malicious code?

One removes and the other removes and repairs

What is the period of time called between malicious code being in the wild and when the vendor has patched for it?

Zero day vulnerability

What 2 things can you do to protect against zero day vulnerabilities?

Do integrity checking with SW like Tripwire that looks for unexpected modifications and maintain ACLs to limit the spread

What is the simplest technique attackers use to gain illegitimate access?

Password attacks (guessing or attacking a dictionary that stores passwords)

What helps users who forget complex passwords by allowing them to create unique, strong passwords for each service they use without having to memorize them?

LastPass tool

What is the cornerstone of any security program?

Education

What is the best way to prevent password attacks?

Supplement them with other authentication techniques

Once attackers get into a system, they can use rootkits to elevate their privileges. What is the best defense against rootkit vulnerabilities?

Keep systems patched

What enables attackers to inject client-side scripts into web pages that take users to another page that is authentic, but malicious code gets executed asking for personal information and too often is given up?

Cross-Site Scripting (XSS)

How do you prevent XSS?

Require input validation on user input fields.

What is even riskier than XSS where attackers insert nefarious statements into a field in a web data-driven app to gain unauthorized access to the underlying db and makes changes at the db level? (e.g. dump the contents of the db to the attacker)

SQL Injection

How do you counter SQL Injections?

Require input validation


Limit privileges to the db used by the web server


Use stored procedures (they limit the apps ability to execute arbitrary code)

What types of attacks target specific systems to gather information?

Reconnaissance attacks

What reconnaissance attack pings IP addresses on a network looking for systems that respond to the ping?

IP Probes (aka IP Sweeps or Ping Sweeps)

What reconnaissance attack is used to scan the IP addresses that respond to a ping and is now looking for services that run there?

Port Scans

What reconnaissance attack looks for vulnerabilities the system might have? Nessus and Open VAS are common tools for this.

Vulnerability Scans

What reconnaissance-type attack is looking through physical documents thrown out that may contain sensitive information?

Dumpster Diving

What type of attacks impersonate someone who has permissions an attacker desires?

Masquerading Attacks

What masquerading attack is it where an attacker reconfigures their system so it has the IP address of a trusted system to gain access to other resources?

IP Spoofing

How do you counter IP Spoofing attacks?

Set internal IP addresses to not be able to enter the network from the outside.


Set external IP addresses to not be able to exit the network from the inside.


Set private IP addresses to not pass through the router in either direction unless specifically allowed.

What is it when an attacker takes over an active session and assumes the identity of the authorized user?

Session Hijacking

These are common techniques for what type of attack? Capturing details of the authentication between the client and server; Tricking the client into thinking the attacker's system is the server; Accessing Web applications using the cookie data of a user who did not properly close the connection.

Session Hijacking

How do you combat Session Hijacking attacks?

Use anti-replay authentication and make cookies expire within a reasonable period.

In object-oriented programming do you want high or low Cohesion (combines related sw components into 1 unit) and high or low Coupling (dependency on other sw modules)?

High Cohesion and low Coupling

In object-oriented programming, what does one object invoke in another object that it wants to interact with?

Method.


It invokes one of the objects methods

When the password is strong, how would an attacker try and get it?

Social engineering

Which ensures UAT has occurred, Change Control or Release Control?

Release Control

What attack exploits the trust that sites have in a user's browser by forcing submission of authenticated requests to 3rd party sites?

Cross-Site Request Forgery (XSRF or CSRF)

If non-volatile storage like flash drives, DVDs and hard disks are secondary storage, what is meant by Primary Storage?

Memory.


It is directly available to the CPU.

What attack are the double dots in this series indicating? ../../../../

Directory Traversal attack

What is the level of confidence in SW, Assurance or Accreditation?

Assurance

What are the 2 types of covert channels for exfiltrating information?

Timing and storage

What is it called when an attacker can deduce a more sensitive piece of information by analyzing several pieces of less sensitive information?

Inference



It is not Aggregation (act of obtaining information classified as a high level by combining low level information. Also is the unintended accumulation of privileges.

What is most effective against session hijacking, expire cookies frequently or use TLS?

Use TLS

What is put in place of the hashed password in a password file when the hashed password is stored in a shadow password file?

x


What db is not relational or hierarchical and instead stores key-value?

NoSQL db

What is like a NoSQL db, but uses nodes and edges to store data rather than keys and values?

Graph db

In a RDBMS, what key uniquely identifies each row (primary, foreign or candidate key)?

Primary

What allows the storage of different pieces of information in a db at different classification levels to prevent attackers from inferring anything about the absence of information?

Polyinstantiation

What occurs when one transaction reads a value from a db that was written by another transaction that did not commit?

Dirty read