600 Flashcards

1
Q

92 - 128 - 256 bit bit/key strength

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

168 bit/key strength

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

160 bit/key strength

A

SHA-1 bit/key strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

128 bit/key strength

A

MD5 bit/key strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MSCHAPv2

A

Microsoft’s authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a legacy suite of Microsoft security protocols that provides authentication - integrity - and confidentiality

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stop gap replacement for WEP while hardware was upgraded to support full WPA

A

TKIP(Temporal Key Integrity Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows single file encryption

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social media sites fuel what type of attacks?

A

Cognitive password attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

A

PEAP(Protected Extensible Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

encrypts a chunk of bits at a time before sending them over the network.

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others’ identity

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Strongest access control

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

limiting MAC addresses to a port prevents what?

A

Rogue access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where

A

Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Plain text and cipher text are always the same size

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Secure a router in an unsecured closet?

A

disable the console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a system that is designed to detect potential data breach

A

DLP(data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Personal Electronic Device

A

PED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disable what to prevent a web server from being used as a mail relay?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mitigate ARP spoofing attacks?

A

Flood guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cisco: block tftp and record it?

A

deny udp any server eq 69 log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protect from zero day attacks?

A

HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Triple A Services

A

Authorization - Authentication - Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Query packet for remote identification - lights up multiple flag fields?

A

XMAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Username - password & PIN?

A

single factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Smartcards vs key punch?

A

eliminates shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Keys needed to decrypt encrypted data are held in escrow so that an authorized third party may gain access to those keys.

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain - runs on each domain controller

A

Kerberos Key Distrobution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Deploys quickly and cleanly and won’t leave behind oily residue - particulate - or water.

A

FM-200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Separation of duties is often implemented between developers and administrators in order to separate which of the following?

A

Changes to code and the ability to deploy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

used to encrypt plaintext or to verify a digital signature

A

public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

the use of different keys to perform these opposite functions - each the inverse of the other

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

the same key to perform both encryption & decryption

A

symmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Provides centralized Authentication - Authorization - and Accounting (AAA). Layer 7 UDP -

A

radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

the most widely used software stream cipher and is used in popular protocols such as Secure Sockets Layer (SSL)

A

rc4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Chap (challenge-handshake authentication protocol)

A

Server sends a challenge the host - who responds with a value obtained by using a one-way hash function. The server compares it to its own calculation of the expected hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Key length of 168 bits (three 56-bit DES keys) - but due to the meet-in-the-middle attack - the effective security it provides is only 112 bits.

A

3des

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Configuring mode - encryption methods and security associations are part of?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Authentication to TCP 49?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Enforces permissions based on data labeling?

A

Mandatory Access Control (Least Privilege)

42
Q

Goal for acceptable downtime during a disaster or other contingency?

A

Recovery Time Objective

43
Q

What are certificates for?

A

code signing - client authentication

44
Q

What device potentially has a DMZ interface?

A

firewall

45
Q

What should follow patch deployment?

A

Audit and verification

46
Q

How to ensure users only have access during certain hours?

A

Time of day restrictions

47
Q

What logs do you use when you need to know if people are trying to access a host?

A

Security Logs

48
Q

What technologies could be used to provide remote access?

A

firewall & VPN

49
Q

Smart cards for remote authentication are susceptible to what?

A

Malicious code on the local system

50
Q

Best tool to check user password complexity?

A

password cracker

51
Q

How to recover a forgotten password?

A

brute force

52
Q

What is needed on a server that stores private keys?

A

hardware security module

53
Q

A certificate authority takes what action in PKI?

A

issues and signs root certificates

54
Q

Why is input validation important?

A

Mitigates buffer overflow

55
Q

An inexpensive way to to deter physical intrutions?

A

fake cameras

56
Q

3rd party access to data

A

Common security concern for cloud computing?

57
Q

Counter measure for SQL injection?

A

input validation

58
Q

Congestion on firewall and half-open connections?

A

DDoS

59
Q

Employee badges?

A

Smartcard

60
Q

Interferes with network-based detection techniques?

A

SSL

61
Q

Random test data generated by an automated system?

A

Fuzzing

62
Q

Analyze a malicious payload?

A

protocol analyzer

63
Q

when a hash function produces the same hash value for two different sets of data

A

Collision

64
Q

Unauthorized access via Bluetooth

A

Bluesnarfing

65
Q

social engineering over telephone system

A

Vishing

66
Q

Physical accquisition of discarded data

A

Dumpster diving

67
Q

tbd

A

Cross-site scripting

68
Q

Open Source on-the-fly encryption

A

TrueCrypt

69
Q

Asset Value x Exposure Factor

A

SLE Single Loss Expectancy

70
Q

VLAN Ethernet standard

A

802.1q

71
Q

Users can grant other access

A

Discretionary Access Control

72
Q

Supports VPNs - combined with IPsec to provide security

A

L2TP

73
Q

Authenticates and/or encrypts each IP packet of a communication session.

A

IPsec

74
Q

Predecessor or TLS - developed by Netscape. Asymmetric cryptography for authentication and confidentiality of the key exchange - symmetric encryption for data/message confidentiality - and message authentication codes for message integrity

A

SSL

75
Q

TLS

A

Is initialized at layer 5 (the session layer) then works at layer 6 (the presentation layer)

76
Q

Also known as Triple DES. A block cipher algorithm used for encryption.

A

3DES

77
Q

The standard that provides for bandwidths of up to 54Mbps in the 5GHz frequency spectrum.

A

802.11a

78
Q

The standard that provides for bandwidths of up to 11Mbps in the 2.4GHz frequency spectrum. This standard is also called WiFi or 802.11 high rate.

A

802.11b

79
Q

The standard that provides for bandwidths of 20Mbps+ in the 2.4GHz frequency spectrum.

A

802.11g

80
Q

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.

A

acceptable use policy

81
Q

An attack aimed at gaining access to your resources

A

access attack

82
Q

The meansof giving or restricting user access to network resources.

A

Access Control

83
Q

List of rights that an object has - to resources on a network.

A

Access Control List (ACL)

84
Q

The point at which access to a network is accomplished. This term is often used in relation to WAP (Wireless Access Point).

A

access point (AP)

85
Q

The act of being responsible for an item. The administrator is often accountable for the network and the resources on it.

A

accountability

86
Q

The act of keeping track of activity.

A

accounting

87
Q

A message confirming that a data packet was received. This occurs at the Transport layer of the OSI model.

A

acknowledgment (ACK)

88
Q

The replacement for NT Directory Service (NTDS) that is included with Windows 2000/2003.

A

Active Directory

89
Q

A response generated in real time.

A

active response

90
Q

Also known as TCP/IP hijacking. This involves an attacker gaining access to a host in the network and logically disconnecting it from the network.

A

active sniffing

91
Q

A technology implemented by Microsoft that allows customized controls - icons - and other features to increase the usability of web-enabled systems.

A

ActiveX

92
Q

Any action undertaken by a user.

A

activity

93
Q

A network created when two RF-capable devices are brought within transmission range of each other. A common example is handheld PDAs beaming data to each other.

A

ad hoc RF network

94
Q

Protocol used to map MAC (physical) addresses to IP addresses.

A

Address Resolution Protocol (ARP)

95
Q

These work by looking for deviations from a pattern of normal network traffic.

A

AD-IDS

96
Q

A set of rules that govern administrative usage of the system.

A

administrative policies

97
Q

The user who is accountable and responsible for the network.

A

administrator

98
Q

A FIPS publication that specifies a cryptographic algorithm for use by the U.S. government.

A

Advanced Encryption Standard (AES)

99
Q

Software that gathers information to pass on to marketers - or intercepts personal data such as credit card numbers.

A

Adware

100
Q

A header used to provide connectionless integrity and data origin authentication for IP datagrams - and used to provide protection against replays.

A

AH (Authentication Header)