Cissp & Security+ Cheat Sheet Page 2

ADVERTISEMENT

23
Telnet
25
SMTP
49
TACACS
53
DNS
67 & 68
DHCP
80
HTTP
110
POP3
143
IMAP4
161
SNMP
389 & 636
LDAP
443
HTTPS / SSL
UDP 1701
L2TP
TCP 1723
PPTP
Integrity - Assuring the recipient that a message has not been altered in transit.
Audit Log - A collection of information that includes login, file access, other various
ensures all data is sequenced, and numbered.
activities, and actual or attempted legitimate and unauthorized violations
PPTP only works over IP.
VLAN - originally designed to decrease broadcast traffic but is also beneficial in
Asymmetric encryption scheme relies on both the sender and receiver to use
reducing the likelihood of having information compromised by sniffers
Active detection IDS systems may break off suspicious connections or shut down
different keys to encrypt and decrypt messages. Encryption and authentication can
take place without sharing private keys. encrypt symmetric keys
the server or service
The integrity of a cryptographic system is considered compromised if the private
CRL and OCSP - two common methods when using a public key infrastructure for
key is disclosed.
maintaining access to servers in a network
WTLS (W ireless Transport Layer Security) provides privacy, data integrity and
IPSec Provides the Authentication Header (AH) for data integrity and Encapsulation
authentication for handles devices in a wireless network environment.
Security Payload (ESP) for data confidentiality.
File encryption using symmetric cryptography satisfies authentication
TCP SYN scan - used to see what ports are in a listening state and then performs a
The primary DISADVANTAGE of symmetric cryptography is key distribution.
two way handshake
SYN Flood - A network attack that misuses TCP’s (Transmission Control Protocol)
NAT (Network Address Translation) can be accomplished with static and hide NAT
three way handshake to overload servers and deny access to legitimate users.
(Network Address Translation) and PAT (Port Address Translation)
When a user digitally signs a document an asymmetric algorithm is used to encrypt
Due care - Policies and procedures intended to reduce the likelihood of damage or
hash results
injury
Least privilege – need to know security basis.
Business impact analysis - obtain formal agreement on maximum tolerable
Applying ingress filtering to routers is the best method to prevent ip spoofing
downtime
attacks.
Documenting change levels and revision information is most useful for Disaster
MD5 (Message Digest 5) - A common algorithm used to verify the integrity of data
recovery
from a remote user through a the creation of a 128-bit hash from a data input
worm is able to distribute itself without using a host file
Worms are self replicating, Trojans are not.
Single servers are frequently the targets of attacks because they contain
Message authentication codes are used to provide integrity.
credentials for many systems and users
False positive - Incorrectly detecting authorized access as an intrusion or attack.
Multi-factor authentication may be needed when a stored key and memorized
ICMP quoting - W hat fingerprinting technique relies on the fact that operating
password are not strong enough and additional layers of security is needed
systems differ in the amount of information that is quoted when ICMP (Internet
VPN Drawback - a firewall CAN NOT inspect encrypted traffic
Control Message Protocol) errors are encountered
man trap - physical access control most adequately protects against physical
SSL - protocol typically used for encrypting traffic between a web browser and web
piggybacking
server. Available in 40 and 128 bit encryption.
LDAP directories are arranged as Trees
IPSec - a popular VPN (Virtual Private Network) protocol operating at OSI (Open
Data integrity is best achieved using a Message digest
Systems Interconnect) model Layer 3.
minimum length of a password be to deter dictionary password cracks 8
Digital signatures provide authentication and non-repudiation - not confidentiality.
CRL certificates that have been disabled before their scheduled expiration.
DAC (Discretionary Access Control) relies only on the identity of the user or
logging - to keep a record of system usage
process. Each object has an owner, which has full control over the object
Security controls may become vulnerabilities in a system unless they are
Access controls that are created and administered by the data owner
adequately tested
MAC - Access controls based on security labels associated with each data item and
RBAC Access control decisions are based on responsibilities that an individual user
each user. use levels of security to classify users and data
or process has in an organization
DEN is not inferior to SNMP
The start of the LDAP directory is called the root
Kerberos - Time synchronization services for clients and servers..
HAS encryption - 128 bits.
A malformed MIME (Multipurpose Internet Mail Extensions) header can cause an
SSLv3.0 (Secure Sockets Layer version 3.0) added the ability to force client side
authentication via digital certificates
email server to crash.
Passive detection – analyzing log files after an attack begins.
virus - replication mechanism, activation mechanism and objective
the best defense against man in the middle attacks is strong encryption, auth
Hashed passwords subject to man in the middle attacks
*The Secure Sockets Layer (SSL) protocol uses both asymmetric and symmetric
Systems identified in a formal risk analysis process should be included in a disaster
recover plan.
key exchange. Use asymmetric keys for the SSL handshake. During the handshake,

Certificate policy - A PKI (Public Key Infrastructure) document that serves as the
the master key, encrypted with the receiver public passes from the client to the
server. The client and server make their own session keys using the master key.
vehicle on which to base common interoperability standards and common assurance
criteria on an industry wide basis.
The session keys encrypt and decrypt data for the remainder of the session.
Buffer overflow – sends more traffic to a node than anticipated.
Symmetric key exchange occurs during the exchange of the cipher specification, or

Differential backup methods copies only modified files since the last full backup
encryption level.
PKI technical solution for reducing the threat of a man in the middle attack
IM is a peer-to-peer network that offers most organizations virtually no control over

CRL (Certificate Revocation List) query that receives a response in near real time
it. Most vulnerable to sniffing

does not guarantee that fresh data is being returned.
Decentralized privilege management environment, user accounts and passwords

multi-homed firewall If the firewall is compromised, only the systems in the DMZ
are stored on each individual server.

A FTP bounce attack is generally used to establish a connection between the FTP
(The main purpose of digital certificates is to bind a public key to the entity that holds
server and another computer
the corresponding private key


Network Based IDS - a system for an internal network that will examine all packets
One of the factors that influence the lifespan of a public key certificate and its
for known attack signatures.
associated keys is the Length of the asymmetric hash.


Ping of Death Attack A network attack method that uses ICMP (Internet Control
In order for a user to obtain a certificate from a trusted CA (Certificate Authority), the
Message Protocol) and improperly formatted MTUs (Maximum Transmission Unit) to
user must present proof of identity and a Public key

crash a target computer
What is the primary DISADVANTAGE of a third party relay Spammers can utilize the

relay.
By SSO, the authentication problem of multiple usernames and passwords is

The greater the keyspace and complexity of a password, the longer a attack may
addressed, browse multiple directories

take to crack the password brute force
PKI (Public Key Infrastructure) - the best technical solution for reducing the threat of

The W AP (Wireless Application Protocol) programming model is based on the
a man in the middle attack

following three elements Client, gateway, original server
Security controls may become vulnerabilities in a system unless they are
What is a good practice in deploying a CA (Certificate Authority create a CPS
adequately tested.
(Certificate Practice Statement).
The standard encryption algorithm based on Rijndael is known as AES.


What is the default transport layer protocol and port number that SSL (Secure
misuse detection - Management wants to track personnel who visit unauthorized
Sockets Layer) uses TCP (Transmission Control Protocol) transport layer protocol
web sites.
Hosting included in a SLA (Service Level Agreement) to ensure the availability of
and port 443
What has 160-Bit encryption? SHA-1
server based resources rather than guaranteed server performance levels


Which of the following is typically included in a CRL certificates that have been
SSL uses an asymmetric key and operates at the session layer

RAID supports High Availability
disabled before their scheduled expiration


Common Criteria - The defacto IT (Information Technology) security evaluation
DDoS (Distributed Denial of Service) is most commonly accomplished by multiple
servers or routers monopolizing and over whelming the bandwidth of a particular
criteria for the international community
server or router.
Crime scene technician - Tag, bag, and inventory evidence
IMAP4 requires port
to be open 143

ADVERTISEMENT

00 votes

Related Articles

Related forms

Related Categories

Parent category: Education
Go
Page of 3