As part of determining how critical an asset is, you need to understand the following terms:
Maximum tolerable downtime (MTD): The ______________ amount of time that an organization can tolerate a single resource or function being down. This is also referred to as ___________________________________________________.
Mean time to repair (MTTR): The _________________ required to ______________ a single failed component or device when a disaster or disruption occurs.
Mean time between failure (MTBF): The __________________________________ a device will operate before a _______________ occurs. This amount is calculated by the ___________________. System reliability is increased by a _______________ MTBF and ______________ MTTR.
Recovery time objective (RTO): The _______________ after a disaster or disruptive event within which a resource or function must be _______________ to avoid unacceptable consequences. RTO assumes that an acceptable period of downtime exists. RTO should be smaller than ____________.
Work recovery time (WRT): The _________________ that is needed to verify _____________ and/or _______________.
Recovery point objective (RPO): The _______________ targeted period in which data might be ______ from an IT service due to a major incident.
Administrative (Management) Controls |
Compensative |
Corrective |
Detective |
Deterrent |
Directive |
Preventive |
Recovery |
---|---|---|---|---|---|---|---|
Personnel procedures |
|
|
|
|
|
|
|
Security policies |
|
|
|
|
|
|
|
Monitoring |
|
|
|
|
|
|
|
Separation of duties |
|
|
|
|
|
|
|
Job rotation |
|
|
|
|
|
|
|
Information classification |
|
|
|
|
|
|
|
Security awareness training |
|
|
|
|
|
|
|
Investigations |
|
|
|
|
|
|
|
Disaster recovery plan |
|
|
|
|
|
|
|
Security reviews |
|
|
|
|
|
|
|
Background checks |
|
|
|
|
|
|
|
Termination |
|
|
|
|
|
|
|
Supervision |
|
|
|
|
|
|
|
Logical (Technical) Controls |
Compensative |
Corrective |
Detective |
Deterrent |
Directive |
Preventive |
Recovery |
---|---|---|---|---|---|---|---|
Password |
|
|
|
|
|
|
|
Biometrics |
|
|
|
|
|
|
|
Smart cards |
|
|
|
|
|
|
|
Encryption |
|
|
|
|
|
|
|
Protocols |
|
|
|
|
|
|
|
Firewalls |
|
|
|
|
|
|
|
IDS |
|
|
|
|
|
|
|
IPS |
|
|
|
|
|
|
|
Access control lists |
|
|
|
|
|
|
|
Routers |
|
|
|
|
|
|
|
Auditing |
|
|
|
|
|
|
|
Monitoring |
|
|
|
|
|
|
|
Data backups |
|
|
|
|
|
|
|
Antivirus software |
|
|
|
|
|
|
|
Configuration standards |
|
|
|
|
|
|
|
Warning banners |
|
|
|
|
|
|
|
Connection isolation and termination |
|
|
|
|
|
|
|
Physical (Technical) Controls |
Compensative |
Corrective |
Detective |
Deterrent |
Directive |
Preventive |
Recovery |
---|---|---|---|---|---|---|---|
Fencing |
|
|
|
|
|
|
|
Locks |
|
|
|
|
|
|
|
Guards |
|
|
|
|
|
|
|
Fire extinguisher |
|
|
|
|
|
|
|
Badges |
|
|
|
|
|
|
|
Swipe cards |
|
|
|
|
|
|
|
Dogs |
|
|
|
|
|
|
|
Man traps |
|
|
|
|
|
|
|
Biometrics |
|
|
|
|
|
|
|
Lighting |
|
|
|
|
|
|
|
Motion detectors |
|
|
|
|
|
|
|
CCTV |
|
|
|
|
|
|
|
Data backups |
|
|
|
|
|
|
|
Antivirus software |
|
|
|
|
|
|
|
Configuration standards |
|
|
|
|
|
|
|
Warning banner |
|
|
|
|
|
|
|
Hot, warm, and cold sites |
|
|
|
|
|
|
|
Determining the impact from a loss of confidentiality of PII should take into account relevant factors including
_________________: How easily PII can be used to identify specific individuals
______________of PII: How many individuals are identified in the information
___________________: The sensitivity of each individual PII data field, as well as the sensitivity of the PII data fields together
___________________: The purpose for which PII is collected, stored, used, processed, disclosed, or disseminated
________________________________: The laws, regulations, standards, and operating practices that dictate an organization’s responsibility for protecting PII
________________________________: The nature of authorized access to PII
When working with relational database management systems (RDBMSs), you should understand the following terms:
____________: A fundamental entity in a relational database in the form of a table.
Tuple: A ____________ in a table.
Attribute: A ___________________ in a table.
Schema: ___________________ of a relational database.
___________________: A collection of related data items.
Base relation: In SQL, a relation that is actually ________________in the database.
View: The set of data ___________________ to a given _______________. ___________________ is enforced through the use of views.
Degree: The ___________________ of ___________________ in a table.
Cardinality: The ___________________ of ___________________ in a relation.
Domain: The set of allowable ___________________ that an attribute can take.
Primary key: Columns that make each row ___________________.
Foreign key: An ___________________ in one relation that has values matching the ___________________ key in another relation. Matches between the foreign key and the primary key are important because they represent references from one relation to another and establish the connection among these relations.
Candidate key: An ___________________ in one relation that has values matching the ___________________ key in another relation.
Referential integrity: Requires that for any foreign key attribute, the referenced relation must have a ___________________ with the ___________________ value for its ___________________ key.
Strengths |
Weaknesses |
---|---|
1,000 to 10,000 times ____________ than asymmetric algorithms |
Number of ____________ keys needed can cause key ____________ issues |
____________ break |
____________ key distribution critical |
____________ to implement than asymmetric |
Key ____________ occurs if one party is ____________, thereby allowing ____________ |
Strengths |
Weaknesses |
---|---|
Key distribution is ____________ and more ____________ than with symmetric algorithms. |
More ____________ to implement than symmetric algorithms. |
Key management is ____________ because the same ____________ key is used by all parties. |
1,000 to 10,000 times ____________ than symmetric algorithms. |
Algorithm Name |
Block or Stream Cipher? |
Key Size |
Number of Rounds |
Block Size |
---|---|---|---|---|
DES |
|
|
|
|
3DES |
|
|
|
|
AES |
|
|
|
|
IDEA |
|
|
|
|
Skipjack |
|
|
|
|
Blowfish |
|
|
|
|
Twofish |
|
|
|
|
RC4 |
|
|
|
|
RC5 |
|
|
|
|
RC6 |
|
|
|
|
RC7 |
|
|
|
|
Key Type |
Security Service |
Security Protection |
Period of Protection |
---|---|---|---|
Private signature key |
Source authentication Integrity authentication Support nonrepudiation |
Integrity Confidentiality |
From generation until the end of the cryptoperiod |
Public signature verification key
|
|
|
|
Symmetric authentication key
|
|
|
|
Private authentication key
|
|
|
|
Public authentication key
|
|
|
|
Symmetric data encryption/decryption key
|
|
|
|
Symmetric key-wrapping key
|
|
|
|
Symmetric RBG key
|
|
|
|
Symmetric master key
|
|
|
|
Private key-transport key
|
|
|
|
Public key-transport key
|
|
|
|
Symmetric key-agreement key
|
|
|
|
Private static key-agreement key
|
|
|
|
Public static key-agreement key
|
|
|
|
Private ephemeral key-agreement key
|
|
|
|
Public ephemeral key-agreement key
|
|
|
|
Symmetric authorization key
|
|
|
|
Private authorization key
|
|
|
|
Public authorization key
|
|
|
|
Application Protocol |
Transport Protocol |
Port Number |
---|---|---|
Telnet |
|
|
SMTP |
|
|
HTTP |
|
|
SNMP |
|
|
FTP |
|
|
FTPS |
|
|
SFTP |
|
|
TFTP |
|
|
POP3 |
|
|
DNS |
|
|
DHCP |
|
|
SSH |
|
|
LDAP |
|
|
NetBIOS |
|
|
CIFS/SMB |
|
|
NFSv4 |
|
|
SIP |
|
|
XMPP |
|
|
IRC |
|
|
RADIUS |
|
|
rlogin |
|
|
rsh and RCP |
|
|
IMAP |
|
|
HTTPS |
|
|
RDP |
|
|
AFP over TCP |
|
|
Class |
Range |
Mask |
Initial Bit Pattern of First Octet |
Network/Host Division |
---|---|---|---|---|
Class A |
|
|
01 |
net.host.host.host |
Class B |
|
|
10 |
net.net.host.host |
Class C |
|
|
11 |
net.net.net.host |
Class D |
|
Used for _____________ |
|
|
Class E |
|
Reserved for ___________ |
|
|
Class |
Range |
---|---|
Class A |
|
Class B |
|
Class C |
|
Property |
IPv4 |
IPv6 |
---|---|---|
Address size and network size |
________ bits, network size 8–30 bits |
________ bits, network size 64 bits |
Packet header size |
________ bytes |
________ bytes |
Header-level extension |
________ number of small IP options |
________ number of IPv6 ________ headers |
Fragmentation |
________ or any intermediate ________ allowed to fragment |
Only ________ may fragment |
Control protocols |
________ of non-IP (ARP), ICMP, and other protocols |
All control protocols based on ________ |
Minimum allowed MTU |
________ bytes |
________ bytes |
Path MTU discovery |
________, not widely used |
Strongly _________________ |
Address assignment |
Usually ________ address per host |
Usually ________ addresses per interface |
Address types |
Use of ________, ________, and ________ address types |
____________ addressing no longer used; use of ____________, ____________, and ____________ address types |
Address configuration |
Devices configured ________ or with __________________ protocols like DHCP |
Devices configure themselves independently using _____________________________________ (SLAAC) or use ____________ |
Variant |
Access Control |
Encryption |
Integrity |
---|---|---|---|
WPA Personal |
|
|
|
WPA Enterprise |
|
|
|
WPA2 Personal |
|
|
|
WPA2 Enterprise |
|
|
|
802.1X EAP Types Feature/Benefit |
MD5 |
TLS |
TTLS |
FAST |
LEAP |
PEAP |
---|---|---|---|---|---|---|
Client-side certificate required |
|
|
|
|
|
|
Server-side certificate required |
|
|
|
|
|
|
WEP key management |
|
|
|
|
|
|
Rogue AP detection |
|
|
|
|
|
|
Provider |
|
|
|
|
|
|
Authentication attributes |
|
|
|
|
|
|
Deployment difficulty
|
|
|
|
|
|
|
Wi-Fi security
|
|
|
|
|
|
|
When considering biometric technologies, security professionals should understand the following terms:
Enrollment time: The process of ____________ the ____________ that is used by the biometric system. This process requires actions that must be repeated several times.
Feature extraction: The approach to ____________ biometric information from a collected ____________ of a user’s ____________ or ____________ characteristics.
Accuracy: The most important characteristic of biometric systems. It is how ____________ the overall readings will be.
Throughput rate: The rate at which the biometric system will be able to ____________ characteristics and ____________ the analysis to permit or deny ____________. The acceptable rate is 6–10 subjects per minute. A single user should be able to complete the process in 5–10 seconds.
Acceptability: Describes the ____________ that users will accept and follow the system.
False rejection rate (FRR): A measurement of ____________ users that will be ____________________ by the system. This is called a ____________ error.
False acceptance rate (FAR): A measurement of the percentage of ___________________ that will be _________________________ by the system. This is called a ____________ error. Type II errors are more ____________ than Type I errors.
______________________________: The point at which FRR equals FAR. Expressed as a percentage, this is the most important metric.
Vulnerability assessments usually fall into one of three categories:
_________________________: Reviews standard practices and procedures that users follow.
_________________________: Reviews facility and perimeter protections.
_________________________: Reviews systems, devices, and network topology.
Network discovery tools can perform the following types of scans:
_________________________: Sends a packet to each scanned port with the SYN flag set. If a response is received with the SYN and ACK flags set, the port is open.
_________________________: Sends a packet to each port with the ACK flag set. If no response is received, then the port is marked as filtered. If an RST response is received, then the port is marked as unfiltered.
_________________________: Sends a packet with the FIN, PSH, and URG flags set. If the port is open, there is no response. If the port is closed, the target responds with an RST/ACK packet.
Type |
Technology |
Characteristics |
---|---|---|
Agent-based |
__________ technology |
Can get information from ________________ machines or machines in the __________ Ideal for __________ locations that have __________ bandwidth Less dependent on ______________________ Based on policies defined in the ________________________ |
Server-based |
__________ technology |
Good for networks with __________ bandwidth Dependent on __________________________ _____________________ does all the scanning and deployment |
The following types of media analysis can be used:
Disk imaging: Creates an _________________ of the _________________ of the hard drive.
Slack space analysis: Analyzes the _________________ (marked as _________________ or _________________) space on the drive to see whether any __________ (marked for ______________) data can be _________________.
Content analysis: Analyzes the contents of the drive and gives a report detailing the ___________ of _____________ by percentage.
Steganography analysis: Analyzes the ____________ on a drive to see whether the ____________ have been _________________ or to discover the _________________ used on the file.
Software analysis techniques include the following:
Content analysis: Analyzes the _________________ of software, particularly _________________, to determine for which _________________ the software was created.
Reverse engineering: Retrieves the _________________ of a program to study how the program _________________ certain operations.
__________________________: Attempts to determine the software’s author.
Context analysis: Analyzes the _________________ the software was found in to discover clues to determining _________________.
Network analysis techniques include the following:
_____________________________: Analyzes communication over a network by capturing all or part of the communication and searching for particular types of activity.
_________________: Analyzes network traffic logs.
_________________: Traces the path of a particular traffic packet or traffic type to discover the route used by the attacker.
RAID Level |
Min. Number of Drives |
Description |
Strengths |
Weaknesses |
---|---|---|---|---|
RAID 0 |
|
Data _________________ without _________________ |
Highest _________________ |
No data _________________; one drive fails, all data is _________________ |
RAID 1 |
|
Disk _________________ |
Very high _________________; very high data _________________; very _________________ penalty on write performance |
High _________________overhead; because all data is _________________, _________________ the storage capacity is required |
RAID 3 |
|
Byte-level data _________________ with dedicated _________________ |
Excellent performance for _________________, _________________ data _________________ |
Not well suited for _________________ network applications; single parity _________________ does not support multiple, simultaneous read and write _________________ |
RAID 5 |
|
Block-level data _________________ with _________________ parity |
Best _________________ for transaction-oriented networks; very high _________________, very high data _________________; supports _________________ simultaneous reads and writes; can also be optimized for large, sequential requests |
Write performance is _________________ than RAID 0 or RAID 1 |
RAID 10 |
|
Disk _________________ with _________________ |
Same _________________ as RAID 1; same _________________ as with mirroring; provides high I/O _________________; can sustain multiple simultaneous drive _________________ |
Very _________________; all drives must move in _________________ to properly track, which reduces sustained performance; very limited _________________ at a very high _________________ |
3.137.213.128