Term
|
Definition
Session Initiation Protocol |
|
|
Term
|
Definition
It is a signaling protocol used for controlling communication as in voice and video calls over IP-based networks. |
|
|
Term
|
Definition
Social engineering activity over the telephone system. |
|
|
Term
|
Definition
It is a standard that addresses call signaling and control multimedia transport and control, and bandwidth control for point to point and multipoint conferences. |
|
|
Term
|
Definition
Real Time Transport Protocol |
|
|
Term
|
Definition
It is used to transmit audio and video over IP-based networks. |
|
|
Term
|
Definition
A program is used to automatically scan a list of telephone numbers to search for computers for the purpose of exploitation and hacking. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A secure private connection through an untrusted network. |
|
|
Term
|
Definition
Point to Point Tunneling Protocol |
|
|
Term
|
Definition
Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
High Assurance Internet Protocol Encryptor |
|
|
Term
|
Definition
It is a type I encryption device that is based on IPSec with additional restrictions, enchancements, and capabilities. |
|
|
Term
|
Definition
|
|
Term
What is IPSec transport adjacency? |
|
Definition
It is when a VPN uses more than one security protocol. |
|
|
Term
What is iterated tunneling? |
|
Definition
It occurs when an IPSec tunnel is tunneled through IPSec tunnel. |
|
|
Term
Describe a SSL Portal VPN |
|
Definition
An individual uses a single SSL connection to a web site to securely access multiple network services. |
|
|
Term
|
Definition
Password Authentication Protocol |
|
|
Term
|
Definition
It is used by remote users to authenticate over PPP conections. |
|
|
Term
What is one of the most unsecure authentication method? |
|
Definition
|
|
Term
How are PAP credentials sent? |
|
Definition
They are sent cleartext (no encryption) |
|
|
Term
|
Definition
Challenge Handshake Authentication Protocol |
|
|
Term
|
Definition
It addresses vulnerabilties found in PAP.
It uses a challenge/response mechanism to authenticate users.
|
|
|
Term
|
Definition
Extensible Authentication Protocol |
|
|
Term
How are signals measured? |
|
Definition
They are measured by frequency and amplitudes. |
|
|
Term
|
Definition
It has a tranfer rate of 11Mbps and is 2.4Ghz. |
|
|
Term
|
Definition
It uses OFDM and works in the 5Ghz band. |
|
|
Term
|
Definition
Provides QoS and supports multimedia traffic in wireless transmissions. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Frequency hopping spread spectrum |
|
|
Term
|
Definition
It takes the total amount of bandwidth and splits it into smaller subchannels. |
|
|
Term
|
Definition
Direct Sequence Spread Spectrum |
|
|
Term
|
Definition
It applies sub-bits to a message and uses all of the available frequencies at the same time. |
|
|
Term
|
Definition
Orthogonal Frequency-Division Multiplexing |
|
|
Term
|
Definition
It is a digital multicarrier modulation scheme that compacts multiple modulated carriers thightly together reducing required bandwidth. |
|
|
Term
|
Definition
It occus when one or more people walk or drive around with a wireless device equipped with software to identify AP's and break into them. |
|
|
Term
|
Definition
It is the area covered by the satellite. |
|
|
Term
What is the sender of information called? |
|
Definition
|
|
Term
What are the two main microwave transmission technologies? |
|
Definition
|
|
Term
What transmission is ground to orbiter to ground |
|
Definition
|
|
Term
What transmission is ground to ground? |
|
Definition
|
|
Term
|
Definition
It is unathorized access from a wireless device through a Bluetooth connection. |
|
|
Term
|
Definition
Frequency Division Multiple Access |
|
|
Term
|
Definition
It was the earliest multiple access technology.
The available frequency is divided into sub-bands and one channel is assigned to each subscriber. |
|
|
Term
|
Definition
Code Division Multiple Access |
|
|
Term
Describe cell phone cloning |
|
Definition
A regular cellphone is stolen and then reprogrammed with someone elses credentials. |
|
|
Term
|
Definition
|
|
Term
How many layers are in the OSI model? |
|
Definition
|
|
Term
What layer do routers work on? |
|
Definition
|
|
Term
|
Definition
It is the session layer and it sets up, maintains, and breaks down the dialog between two applications. |
|
|
Term
|
Definition
The data link layer prepares data for the network medium by framing it. |
|
|
Term
|
Definition
It provides physical connections for transmission and performs the electrical encoding of data. |
|
|
Term
|
Definition
it is a set of rules that dictates how computers communicate over networks. |
|
|
Term
What are the two main protocols at the transport layer? |
|
Definition
|
|
Term
|
Definition
It is a connection oriented protocol that sends and recieves acknowledgments. |
|
|
Term
|
Definition
It is a connectionless protocol that does not recieve acknowledgements. |
|
|
Term
Describe a proxy firewall |
|
Definition
It is the middleman of communication. It does not allow anyone to connect directly to a protected host within the internal network. |
|
|
Term
Describe an Application proxy firewall |
|
Definition
It provides high security and has full application layer awareness. They can have poor performance, limited application support, and poor scalability. |
|
|
Term
What packet switched WAN technologies use virtual circuits? |
|
Definition
|
|
Term
How does TKIP provide more proection for WLAN environments? |
|
Definition
It adds more keying material. |
|
|
Term
Why are swithced infrastructures safer than routed networks? |
|
Definition
It is more idfficult to sniff traffic since computers have virtual provate connections. |
|
|
Term
What kind of proxy can not make access decisions based on protocol commands? |
|
Definition
|
|
Term
What takes place at the data link layer? |
|
Definition
End to end communication. |
|
|
Term
What takes place at the session layer? |
|
Definition
|
|
Term
What is the four step DHCP lease process? |
|
Definition
Discover
Offer
Request
Acknowledge |
|
|
Term
What is used to shield networks from unauthenticated DHP clients? |
|
Definition
|
|
Term
|
Definition
A method of storing and transmitting data in a form that only those it is intended for can read and process. |
|
|
Term
|
Definition
The study of cryptanalysis and cryptography. |
|
|
Term
|
Definition
It is the science of studying and breaking the secrecy of the encryption process. |
|
|
Term
|
Definition
Transforming readable data into a form that appears to be random and unreadable. |
|
|
Term
|
Definition
A system or product that provides encryption and decryption. |
|
|
Term
|
Definition
It is a set of rules that dictates how enciphering and deciphering takes place. |
|
|
Term
What comprises a cryptosystem? |
|
Definition
Software
Protocols
Alogrithms
Keys |
|
|
Term
What services do cryptosystems provide? |
|
Definition
Confidentiality
Integrity
Authentication
Authorization
Nonrepudiation
|
|
|
Term
|
Definition
It is an estimate of the effort and resources it would take an attacker to penetrate a cryptosystem. |
|
|
Term
|
Definition
It is another name for algorithm. |
|
|
Term
|
Definition
It is a sequence of bits used as instructions that govern the acts of cryptograhic functions within an algorithm. |
|
|
Term
|
Definition
It is a range of possible values to construct keys. |
|
|
Term
|
Definition
It is an ancient encryption tool that is used type of paper and rod used by Greek military factions. |
|
|
Term
What is Kerckhoff's principal? |
|
Definition
It is a concept that an algorithm should be known and only the keys should be kept secret. |
|
|
Term
What is a number generator used for? |
|
Definition
It is used to create a stream of random values and must be seeded by an initial value. |
|
|
Term
|
Definition
It is a method of hiding data in another media type so the existenance of the data is concealed. |
|
|
Term
|
Definition
it is an encryption method that is impossible to crack if carried out properly. |
|
|
Term
What is a running key cipher? |
|
Definition
It is a substituition cipher that creates keystream values, commonly from agreed-upon text passages to be used for encryption purposes. |
|
|
Term
|
Definition
It is an encryption method that shifts values. |
|
|
Term
What is a Key Derivation Functions |
|
Definition
It is the generation of secret keys (subkeys) from an initial value.(master key) |
|
|
Term
What are the strengths of symmetric algorithms? |
|
Definition
It is faster than asymmetric alogrithms.
It is hard to break if using a large key size. |
|
|
Term
What are the weakness of symmetric algorithms? |
|
Definition
It requires a secure mechanism to deliver keys properly
Each pair of users needs a unique key making key management tedious.
It provides confidentiality but not authenticity or nonrepudiation. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Business Continuity Management |
|
|
Term
|
Definition
It supplies the framework for and governance of designing and building the BCP effort. |
|
|
Term
|
Definition
|
|
Term
|
Definition
It is a functional analysis in which a team collects data through interviews and documentary sources. |
|
|
Term
|
Definition
Maximum Tolerable Downtime |
|
|
Term
|
Definition
Maximum period time of disruption |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
It is the earliest time period and service level within which a business process must be restored after a disaster to aviod unacceptable consequences. |
|
|
Term
|
Definition
It is the remainder of the overall MTD value. |
|
|
Term
|
Definition
|
|
Term
|
Definition
It is the acceptable amount of data loss measured in time. |
|
|
Term
|
Definition
It is a disruption in service due to a device malfunction or failure. |
|
|
Term
|
Definition
It is an event thar causes the entire facility to be unusable for an entire day or more. |
|
|
Term
|
Definition
It is a major disruption that destorys the facility altogether. |
|
|
Term
|
Definition
Mean Time Between Failure |
|
|
Term
|
Definition
|
|
Term
|
Definition
It is the estimated lifetime of a piece of equipment. |
|
|
Term
|
Definition
It is the estimate of how long it will take to fix a piece of equipment and get it back in production. |
|
|
Term
|
Definition
It is a facility that is leased or rented and is fully configured and ready to operate within a few hours. |
|
|
Term
|
Definition
It is a leased facility that is partially configured with some equipment.
It is the most widely used model.
|
|
|
Term
|
Definition
It is a leased or rented facility that supplies the basic environment, but none of the equipment or additional services.
It may take weeks to get the site to get activated. |
|
|
Term
What is a reciprocal agreement? |
|
Definition
It is an agreement with another company to allow a company to establish an off site facility. |
|
|
Term
Describe a rolling hot site |
|
Definition
It is a mobile hot site where a large truck is turned into a working area. |
|
|
Term
Describe remote journalism |
|
Definition
It is another method of transmiitng data off-site. |
|
|
Term
|
Definition
|
|
Term
|
Definition
It is a combination of technology and processes that work together to ensure some specific thing is always up and running. |
|
|
Term
|
Definition
The standard for Business Continuity Management (BCM) |
|
|
Term
What is a checklist test? |
|
Definition
Copies of the plan are are handed out to each functional area for examiniation to ensure the plan properly deals with the areas needs and vulnerabilities. |
|
|
Term
What is a structured walk-through test? |
|
Definition
The representatives from each functional or department get together and walkthrough the plan from begining to end. |
|
|
Term
What is a simulation test? |
|
Definition
It is a a practice execution of the plan. |
|
|
Term
|
Definition
It is where some system are run at the alternate site during the test. |
|
|
Term
What is a full interuption test? |
|
Definition
It is a test where regular operations are stopped and processing is moved to the alternate site. |
|
|
Term
What is a computer assisted crime? |
|
Definition
It is where a computer was used as a tool to carry out a crime. |
|
|
Term
What is a computer targeted crime? |
|
Definition
It is an incident where a computer was the victim of an attack to harm it and its owners. |
|
|
Term
|
Definition
It is something that is proprietary to a company and important for its survival and profitability. |
|
|
Term
|
Definition
Non Disclosure Agreement. |
|
|
Term
|
Definition
It is used to protect a word associated with a company. |
|
|
Term
|
Definition
Software that is publicly available free of charge. |
|
|
Term
|
Definition
It is used by vendors to market their software.
It is a free trial of software. |
|
|
Term
|
Definition
Software Protection Agency |
|
|
Term
|
Definition
Federation Against Software Theft |
|
|
Term
|
Definition
Personally Identifiable Information |
|
|
Term
What is the Sarbanes-Oxley Act (SOX) |
|
Definition
It provides requirements for how companies must track, manage, and report financial information. |
|
|
Term
When was the Computer Fraud and Abuse Act written? |
|
Definition
1986. It was amended in 1988, 1994, 1996, 2001, 2002, and 2008. |
|
|
Term
What is the Computer Fraud and Abuse Act? |
|
Definition
It is the law in regards to:
Knowingly accessing a computer without authorization in order to obtain national security data.
Intentionally accessing a computer without authorization
Intending to defraud or obtain anything of value from an IS. |
|
|
Term
What is minimum capital requirements? |
|
Definition
Measures the risk and spells out the calculation for determining the minimum capital required. |
|
|
Term
|
Definition
Federal Information Security Management Act of 2002 |
|
|
Term
|
Definition
It requires every federal agency to create an aagency wide security program to protect information systems.
Annual reviews must be conducted. |
|
|
Term
What are the requirements of FISMA? |
|
Definition
Inventory of information systems
Category information and information systems according to risk level
Security controls
Risk assesment
Systsem security plan
Certification and accrediation
Continous monitoring |
|
|
Term
What is the Economic Espionage Act of 1996? |
|
Definition
It provides the necesssary structure when dealing with espionage cases, and defines trade secrets to be technical, business, engineering, scientific, or financial.
Allowd FBI to begin investigating industiral and corporate espionage cases. |
|
|
Term
|
Definition
Reasonable Expectation of Privacy. |
|
|
Term
|
Definition
It is an act or omission that naturally and directly produces a consequence.
It refers ro causes that lead directly to a particular result.
Can be seen as negligence in a court of law. |
|
|
Term
What are the stages of incident response? |
|
Definition
Triage
Investigation
Containment
Analysis
Tracking
Recovery |
|
|
Term
What is triage in the incident response process? |
|
Definition
It is the inital sceening to dtermine if an event is an incident. |
|
|
Term
Wha occurs during the Containment process in incident response processes? |
|
Definition
Damage mitigation takes place.
The containment strategy is based on the category of attack.
|
|
|
Term
What occurs during the Tracking process in incident response processes? |
|
Definition
During this stage it is determined whether the source of the incident was internal or external and how the offender gained access to the network. |
|
|
Term
What occurs during the Recovery process in incident response processes? |
|
Definition
Necessary fixes are implemented to ensure that type of incident can not occir again. |
|
|
Term
What is computer forensics? |
|
Definition
It is specialized techniques for the recovery, authentication, and analysis of electronic data for the purposes of a digitial criminal investigation. |
|
|
Term
What are the different types of assesments an investigator can perform? |
|
Definition
Network Analysis
Communication Analysis
Log Analysis
Path Tracing
Media Analysis
Disk imaging
MAC time analysis
Content Anaylsis
Software Analysis
Reverse engineering
Malicious code review
Exploit review
Hardware analysis
Dedicated appliance attack points
Firmware and dedicated memory inspections
Embeded operating systems analysis |
|
|
Term
What are the steps of the forensic investigation process? |
|
Definition
Identification
Preservation
Collection
Examination
Analysis
Presentation
Decision |
|
|
Term
What is a chain of custody? |
|
Definition
It is a history that shows how evidence was collected, analyzed, transported, and preserved in order to be presented in court. |
|
|
Term
|
Definition
|
|
Term
What is computer-related documents considered? |
|
Definition
|
|
Term
|
Definition
Primary evidence used in a trial because it provdes the most reliability.
Example would be an orignal signed contract. |
|
|
Term
What is Secondary Evidence? |
|
Definition
It is not viewed as reliable in proving innocence or guilt.
Examples are oral evidence, and copies of original documents. |
|
|
Term
|
Definition
It can prove a fact by itself and does not need supporting information.
Example is a witness to a crime. |
|
|
Term
What is Conclusive Evidence? |
|
Definition
It is irrefutable and connot be contradicted. It does not require corroboration. |
|
|
Term
What is Corroborative Evidence? |
|
Definition
It is supportive evidence to prove an idea or point. |
|
|
Term
What is the opinion rule? |
|
Definition
It dictates that a witness must testify to only the facts of the issue and not their opinion of the facts. |
|
|
Term
What is hearsay evidence? |
|
Definition
It pertains to oral or written evidence presented in court that is secondhand and has no firsthand proof of accuracy or reliability. |
|
|
Term
|
Definition
It is an attack in which the attacke commits several smal crimes with the hope that the overall larger crime will go unnoticed. |
|
|
Term
|
Definition
It is the alteration of existing data. |
|
|
Term
What is password Sniffing? |
|
Definition
It is sniffing network traffic with the hope of capturing passwords being sent between computers. |
|
|
Term
|
Definition
It takes place when someone purchases a domain name with the goal of hurting a company with a similar domain name or to carry out extortion. |
|
|
Term
|
Definition
Internet Architecture Board. |
|
|
Term
What is a mixed law system? |
|
Definition
It uses two or more legal systems. |
|
|
Term
What are logon banners used for? |
|
Definition
They are used to inform users what could happen if they do not follow rules pertaining to using company resources. |
|
|
Term
|
Definition
|
|
Term
What are the stages of the System Development Life Cycle? |
|
Definition
Initiation-Need for a new system is defined.
Acquisition/Development- System is created or purchased.
Implementation- New system is installed
Operation/Maintenance- System is used and cared for
Disposal- System is removed from production |
|
|
Term
|
Definition
System Development Life Cycle |
|
|
Term
What are the requirements of SDLC? |
|
Definition
Requirement gathering- Determine why software is being created, what it will do, and for who it will be created for.
Design- Deals with how the software will accomplish the goals identified
Development- Programming software code to meet specifications laid out in design phase.
Testing- Validation software to ensure goals are met.
Release- Deploying the software and ensuring it is properly configured. |
|
|
Term
How many privacy impact ratings are there? |
|
Definition
|
|
Term
What is the P1 privacy impact rating? |
|
Definition
High Privacy Risk.
The product or service sotres or transmits Personally Identifiable Information (PII) |
|
|
Term
What is the P2 Privacy Impact rating? |
|
Definition
Moderate Privacy risk.
The sole behavior that affects privacy in the feature, product, or service is a one-time user initiated anonymous data transfer. |
|
|
Term
What is the P3 Privacy Impact Rating? |
|
Definition
Low Privacy Risk.
No behaviors exist within the product that affect privacy.
No anonymous or personal data is transferred. |
|
|
Term
What is an attack surface? |
|
Definition
It is what is available to be used by an attacker against the product itself. |
|
|
Term
What is an attack surface analysis? |
|
Definition
It is used to identify and reduce the amount of code and functionality accessible to untrusted users. |
|
|
Term
What is dynamic analysis? |
|
Definition
It is the evaluation of a program in real time. |
|
|
Term
What is the difference between verification and validation? |
|
Definition
Verification determines if the product accurately represents and meets specifications.
Validation dterimes if the product provides the necessary solution for the intended real-world problem. |
|
|
Term
What is a Zero-Day vulnerability? |
|
Definition
They are vulnerabilities that do not currently have a resolution. |
|
|
Term
|
Definition
It is a technique used to discover flaws and vulnerabilities in software. |
|
|
Term
|
Definition
|
|
Term
|
Definition
It describes the product and customer requirements. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A project management tool used to define and group a projects individual work elements in an organized manner. |
|
|
Term
|
Definition
Storing of the source code of software with a third party escrow agent. |
|
|
Term
|
Definition
The process of controlling the changes that take place during the life cycle of a system and documenting the necessary change control activities. |
|
|
Term
What is Software Configuration Management |
|
Definition
It identifies the attributes of software at various points in time, and perofrms a methodical control of changes |
|
|
Term
What is a garbage collector? |
|
Definition
It ism blocks of memory that were once allocated but are no longer in use and deallocates the blocks and marks them as free. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A model developed by Microsoft that allows for interprocess communication between applications potentially written in different programming languages. |
|
|
Term
|
Definition
Object Linking and Embedding |
|
|
Term
|
Definition
It provides a way for objects to be shared on a local computer and to use COM as their foundation. |
|
|
Term
What is Data Warehousing? |
|
Definition
It combines data from multiple databases or data sources into a large database for the purpose of providing more extensive information retrieval and data analysis. |
|
|
Term
What is an Artifical Neural Network? |
|
Definition
A mathematical or computational model based on the nueral structure of the brain. |
|
|
Term
|
Definition
It is a virus written in one of these macro language and is platform independent. |
|
|
Term
What is a Compression Virus |
|
Definition
It is a virus that appends itself to a executable on the system. |
|
|
Term
|
Definition
It is files that are executed by an interpreter. |
|
|
Term
What is a Tunneling Virus? |
|
Definition
It is a type of virus that attempts to install itself under the antivirus program. |
|
|