問題一覧
1
detailed description of activities that occur during an attack
attack profile
2
6 steps in contingency planning process
identifying mission - or business-critical functions, identifying resources that support critical functions, anticipating potential contingencies or disasters, selecting contingency planning strategies, implementing contingency strategies, testing and revising strategy
3
three shared functions in continuity strategies
time-share, service bureaus, mutual agreements
4
implementation of cryptographic technology, private and secure network connection
VPN
5
provides service for a fee
service bureaus
6
dynamic filtering, particular packet with a particular source, destination
fourth generation
7
configured application software, runs on general-purpose computer
commercial-grade firewall systems
8
categorization by development generation
first generation, second generation, third generation, fourth generation, fifth generation
9
should be managers or their representatives from various communities of interest
team members
10
to get sites up and running quickly, organization ability to port data into new site's system
off-site disaster data storage
11
matches supplicant to resource, often uses access control matrix
authorization
12
logic based on set of guidelines most commonly referred to as
firewall rules
13
data within IP packet is encrypted, but header information is not, allows user to establish secure link directly with remote host, encrypting only data contents of packet
transport mode
14
incident recovery
identify and resolve vulnerabilities, address safeguards, evaluate monitoring capabilities, restore data from backups, restore process and services, continuously monitor system, restore confidence
15
application proxy examines at ______
application layer
16
set of activities taken to plan for, detect, and correct the impact
incident response
17
unverified entity
supplicant
18
these servers act as _______, encrypting all traffic that will traverse and secured network
encryption points
19
provide guidance in the event of a disaster
disaster recovery plan
20
Kernel proxy, works in the windows NT executive, evaluates at multiple layers
fifth generation
21
tied to the role a user performs
role-based
22
protocol for handling TCP traffic through a proxy server
SOCS servers
23
series of scenarios showing impact
attack success scenario development
24
Leeds project and make sure sound project planning process is used
project manager
25
propriety circuit-level proxy server, places special SOCS client-side agents on each workstation
SOCS servers
26
ties to a set of tasks user performs
task-based
27
inconsist of two separate firewall devices, each separate firewall system, but are connected to work in tandem
hybrid firewalls
28
goes between external request and web page
proxy server
29
all controls rely on:
identification, authentication, authorization, accountability
30
operates at transport level
circuit gateway
31
control measure that reduces accidental security breaches
information security education, training, and awareness
32
Access control for dial-up
RADIUS and TACACS
33
high level manager to support promote and endorse findings of project
champion
34
used in conjunction with filtering router
application gateway
35
inspect networks at the network layer
Packet filtering
36
combined elements of other types of firewalls, elements of packet filtering and proxy servers or circuit gateways
hybrid firewalls
37
determine the extent of resulting damage
threat attack identification and prioritization
38
metric key encryption to validate, keeps a database containing the private keys
kerberos
39
uses a state table
stateful
40
three exclusive options in continuity strategies
hot sites, warm sites, cold sites
41
covers identification of, classification of, and response to an incident
incident response planning
42
something a supplicant knows, has, is
authentication
43
installed on dedicated computer
application gateway
44
authorization based on addresses
circuit gateway
45
clear establishment of priorities, clear delegation of roles and responsibilities, alert key personnel, document disaster, mitigate impact, evacuation of physical assets
disaster recovery plan
46
broadband gateways or DSL or cable modem routers
small office/home office
47
uses data classification schemes
mandatory access control
48
has two network interface cards
dual homed host
49
outlines re-establishment of critical business operations
business continuity planning
50
doesn't include actual applications, application may not be installed in configured, required hours today is to become operational
warm sites
51
objectives of the network, organizations ability to develop and implement architecture
configuration decision
52
allows administrators to restrict content access from within network
software filter
53
analysis and prioritization-business functions, identify and prioritize functions within organization units
business unit analysis
54
non-discretionary controls
role-based, task-based
55
allows specific types of packets that are acceptable to each host
mac layer firewalls
56
5 major categories in processing mode
packet filtering, application gateway, circuit gateway, MAC layer, hybrids
57
firewall architectures
configuration decision, packet filtering routers, screened host firewall, dual homed host, screened subnet firewalls with DMZ, socs servers
58
three types of off-site disaster data storage
electronic vaulting, journaling, shadowing
59
lacks auditing and strong authentication and can degrade network performance
packet filtering routers
60
automatic phone-dialing program that dials every number in a configured range in records number if modern picks up
war dialer
61
stateful, uses state tables
third generation
62
authentication systems
RADIUS and TACACS, Kerberos
63
basis for classification as disastrous not disastrous
subordinate plan classification
64
prevent information from moving between the outside and inside world
firewalls
65
more reactive than proactive with the exception of planning that must occur to prepare IR teams to be ready to react to an incident
incident response
66
transfer of large batches of data, receiving server archives data
electronic vaulting
67
One of least frequently implemented but most beneficial programs
security awareness program
68
rudimentary services and facilities, no hardware or peripherals, empty room
cold sites
69
seek access to a resource by label, mapped to one and only one entity
identification
70
label is called an
identifier
71
fully configured computer facilities, all services and communication links, physical plant operations
hot sites
72
duplicated databases, multiple servers, processes duplicated, three or more copy simultaneously
shadowing
73
categorized by structure
commercial-grade, small office/home office
74
filtering firewall, examine header information and data packets
packet filtering
75
known as auditability, all actions on a system can be attributed to an authenticated identity, system logs and database journals
accountability
76
combines packet filtering router with dedicated firewall: proxy server, allows router to pre-screen packets
screened host firewall
77
able to consider specific host computer identity in filtering
Mac layer firewalls
78
hot, warm, cold, leased with other organizations
time-share
79
involves providing members of organization with detailed information enhance on instruction designed to prepare them to perform their duties securely
security training
80
transfer of live transactions to off-site, only transactions are transferred, transfer is real time
journaling
81
intrusion detection systems, virus detection, system admin, end users
mechanisms
82
tracks of the state in context of each packet
stateful
83
data classification schemes
each collection of information is rated, may use matrix or authorization
84
dominant architecture used today, provides DMZ
screened subnet firewalls with DMZ
85
estimate cost of best, worst, probable
potential damage assessment
86
static packet filtering, simple networking devices, filter packets according to their headers
first generation
87
between trusted and untrusted network, exposed to risk, can place additional filtering routers behind, restricted to a single application
resides in demilitarized zone
88
components of contingency plan
incident response planning, disaster recovery planning, business continuity planning
89
a contract between two or more organizations that specifies how each will assist the other and the event of a disaster
mutual agreements
90
designed to operate at Media Access sublayer
Mac layer firewalls
91
State-alone, combination of hardware and software
commercial-grade
92
organization established 2 perimeter tunnel servers
tunnel mode
93
create tunnels between networks
circuit gateway
94
application level or proxy servers, dedicated systems, provides intermediate services for the requests
second generation
95
similar to Kerberos, user first authenticated to an authentication server and receives a token
secure European system for applications in multiple vendor environment