Additional topics Flashcards

1
Q

Encryption formula

A

C = E(p) = (p+k) mod (26)

p is plaintext and k is the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Decryption Formula

A

P = D ( C ) = (C - k) mod (26)

C is ciphertext and k is the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

prevents unauthorized access to systems by monitoring network traffic, controls incoming and outgoing network traffic based on security rules

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

create encrypted connections over the internet, ensuring secure remote access and protecting data from interception.

A

VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

monitors network traffic for suspicious activity and alerts administrators but does not take action.

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

actively analyzes traffic and takes automatic action (like blocking or rejecting traffic) to prevent attacks in real-time

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is when a hacker attempts to crack a password by comparing it to a wordlist or “dictionary” of common words.

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hackers will use multiple different combinations of letters, symbols and numbers repeatedly until it matches an existing password.

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is similar to the dictionary attack except it uses a precomputed table of common passwords and their corresponding hashes.

A

Rainbow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a penetration testing tool used to assess web application security. Its key features include proxy web-crawling, HTTP request capture/interception, and HTTP request logging. It can also generate reports that indicate weaknesses.

A

BurpSuite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a network protocol analyzer. It is widely used to capture and display packets from a network connection in real-time. It can be used for network troubleshooting and analysis.

A

WireShark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network attack where the attacker sends fake ARP messages to link their MAC address with another device’s IP, enabling them to intercept or alter traffic.

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

maps IP addresses to MAC addresses, allowing devices on a local network to find each other.

A

ARP (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a secure version of HTTP that uses encryption (like SSL/TLS) to protect data between a web browser and a server

A

HTTPS (HyperText Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is an attack that downgrades HTTPS connections to HTTP, letting attackers intercept and read sensitive data in plain text

A

SSLstrip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly