Cybersecurity-Key security tools
Firewalls contribute to the security of your network in which three (3) ways?
-Allow only authorized access to inside the network.
-Prevent unauthorized modifications to internal data from an outside actor.
-Prevent Denial of Service (DOS) attacks.
Which packets are selected for inspection by a packet filtering firewall?
Every packet entering or leaving a network.
True or False: Application Gateways are an effective way to control which individuals can establish telnet connections through the gateway.
True
Why are XML gateways used?
XML traffic passes through conventional firewalls without inspection.
Which three (3) things are True about Stateless firewalls?
-They are faster than Stateful firewalls.
-They filter packets based upon Layer 3 and 4 information only (IP address and Port number)
-They are also known as packet-filtering firewalls.
True or False: Most Antivirus/Antimalware software works by comparing each file encountered on your system against a compressed (zipped) version of known malware maintained by the vendor on the local host.
False
How many unique encryption keys are required for 2 people to exchange a series of messages using asymmetric public key cryptogrophy?
4
What is Cryptographic Strength?
-Relies on math, not secrecy
-Ciphers that have stood the test of time are public algorithms.
-Exclusive Or (XOR) is the “secret sauce” behind modern encryption.
What is the primary difference between Symmetric and Asymmetric encryption?
The same key is used to both encrypt and decrypt the message.
Which type of cryptographic attack is characterized by an attack based upon trial and error where many millions of keys may be attempted in order to break the encrypted message?
Brute Force
What is the correct sequence of steps required for Alice to send a message to Bob using asymmetric encryption?
Alice requests Bob’s public key and uses it to encrypt her message. Alice then sends the encrypted message to Bob who decrypts it using his private key
A skilled penetration tester wants to show her employer how smart she is in hopes of getting a promotion. Without obtaining permission, she hacks into the company’s new online store to see if there are any weaknesses that can be hardened before the system goes live. She does not do any damage and writes a useful report which she sends over her boss’s head to the CISO. What color hat was she wearing?
A Gray Hat
Which three (3) are resources that are available to help guide penetration testing efforts by cybersecurity specialists?
-NIST SP 800-42 Guidelines on Network Security Testing.
-Open Source Security Testing Methodology Manual (OSSTMM).
-Information Systems Security Assessment Framework (ISSAF)
According to the Vulnerability Assessment Methodology, Potential Impacts are determined by which 2 factors?
Exposure and Sensitivity
In digital forensics, the term Chain of Custody refers to what?
The record that documents the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.