08982917_NewHorizons Flashcards

1
Q

Name one Stream Cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IMAP Port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Devices at Layer 3

A

Router - Makes decisions on sending PACKETS..

Can find the fastest ROUTE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Drawback to CBC

A

Have to go in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric Examples

A

RSA (used by Web), Diffie-Hellman,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RC4 is a ______ cipher

A

STREAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Stream Cipher the bit are same size as _____

A

plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deluge System

A

Floods area - Fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Substitution

A

Swaps out plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transposition or Permutation does what?

A

TRANSPOSITION CIPHERS rearrange the letters of a plaintext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 3 (Network) data element

A

PACKET DATAGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTP, HTTP, SMTP function at what layer

A

7 Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Element for Layer 2

A

FRAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Substitution and Transposition provide..

A

Confusion and Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP is in layer …

A

2 Data - Assigns MAC to IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

0-1023 are known as

A

Well known ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key management should be used to:

A
Issue, 
Store , 
Backup, 
Renew, 
Revoke, 
Expire, 
Destroy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security Architects design based on __________

A

requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Layer 2 Tunneling protocol, occurs at what layer?

A

Layer 2 (data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SAG vs BROWNOUT

A

SAG short timeframe of LOW

BROWNOUT longer timeframe of low power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Attempting to use multiple combinations of username and password. What is this attack?

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Covert Channel is _______. What types are there?

A

“Unintended” access to data.

Storage-

Timing- Observe timing and order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PKI workflow

A

Sender requests certificate from CA
Sender gets certificate
Receiver verifies CA using CRL or OCSP
Receiver trusts Sender

24
Q

Birthday attack focuses on finding ______

A

Collisions.

25
Q

Hash - One Way

A

MD5, SHA1/2/256,

26
Q

ICMP, OSPF and IP reside at what layer?

A

Layer 3 (Network)

27
Q

IMAPs Port

A

995

28
Q

802.3 operates at which layer?

A

Layer 1 and 2, Ethernet

29
Q

Layer 3 (Network) protocols

A

IP, ICMP, RIP, OSPF

30
Q

ICS vulnerabilities

A

legacy code,

31
Q

Cipher is also known as an _______

A

algorithm

32
Q

IP is layer ..

A

3 Network

33
Q

ICS mitigation

A

Patching, design using IDS and Firewalls,

34
Q

Stream ciphers encrypt data ____ at a time

A

ONE

35
Q

TCP/IP Stack

A

Application
Host to Host
Networking
Network Access

36
Q

What is the most commonly used and standard for Symmetric Encryption

A

AES

37
Q

Block cipher blocks in ______

A

Chunks - 64/128bit at a time.

38
Q

Stream and Block are a form _____ encryption

A

Symmetric

39
Q

Key Clustering

A

Multiple Keys work for one lock

40
Q

US Government Security Modes: Security Modes Must have these 3 things:

A

1) Mandatory Access Control environment MAC.
2) Total PHYSICAL control of COMPUTER CONSOLE.
3) Total PHYSICAL control over subject access to COMPUTER CONSOLE work space. ..

41
Q

_______ _______mode provides the most granular control over resources and users because it enforces clearances, requires need to know, and allows the processing of only single sensitivity levels. All the other levels either do not have unique need to know between users (dedicated), allow multiple levels of data processing (compartmented), or allow a wide number of users with varying clearance (multilevel).

A

System high

42
Q

Layer 2 devices?

A

Switches (layer 2 switch)

43
Q

Layer 4 (Transport) data element

A

SEGMENT

44
Q

Block Cipher Examples

A

DES, AES, Blowfish, IDEA

45
Q

UDP, TCP, SSL/TLS is what layer

A

Layer 4 Transport

46
Q

Layer 6 protocols and functions

A

Encryption, JPG, MPG, JPG

47
Q

Primary risk for sending unencrypted data on the network

A

Sniffing attack

48
Q

HTTP is what layer

A

7 Apllication

49
Q

Encryption is used for ______ , _______and ____

A

Confidentiality, Integrity and NonRepudiation

50
Q

Stream Cipher Examples

A

RC4

51
Q

Block Cipher is _______ than Stream Cipher but more secure

A

Slower

52
Q

JPG, MPG, PNG, Encryption and Compression layer ??

A

6 Presentation

53
Q

Dictionary Attack

A

Encrypts know pw’s and compares the hash with your hash.

54
Q

Layer 2 (Data) protocols

A

ARP, Ethernet, L2TP

55
Q

Well Known Port #’s

A

0-1023