Additional topics - Reversed Flashcards

1
Q

C = E(p) = (p+k) mod (26)

p is plaintext and k is the key

A

Encryption formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

P = D ( C ) = (C - k) mod (26)

C is ciphertext and k is the key

A

Decryption Formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls

A

prevents unauthorized access to systems by monitoring network traffic, controls incoming and outgoing network traffic based on security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPNs

A

create encrypted connections over the internet, ensuring secure remote access and protecting data from interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion Detection Systems (IDS)

A

monitors network traffic for suspicious activity and alerts administrators but does not take action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intrusion Prevention Systems (IPS)

A

actively analyzes traffic and takes automatic action (like blocking or rejecting traffic) to prevent attacks in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dictionary attack

A

is when a hacker attempts to crack a password by comparing it to a wordlist or “dictionary” of common words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force attack

A

hackers will use multiple different combinations of letters, symbols and numbers repeatedly until it matches an existing password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rainbow attack

A

is similar to the dictionary attack except it uses a precomputed table of common passwords and their corresponding hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BurpSuite

A

is a penetration testing tool used to assess web application security. Its key features include proxy web-crawling, HTTP request capture/interception, and HTTP request logging. It can also generate reports that indicate weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WireShark

A

is a network protocol analyzer. It is widely used to capture and display packets from a network connection in real-time. It can be used for network troubleshooting and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP poisoning

A

A network attack where the attacker sends fake ARP messages to link their MAC address with another device’s IP, enabling them to intercept or alter traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP (Address Resolution Protocol)

A

maps IP addresses to MAC addresses, allowing devices on a local network to find each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTPS (HyperText Transfer Protocol Secure)

A

is a secure version of HTTP that uses encryption (like SSL/TLS) to protect data between a web browser and a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSLstrip

A

is an attack that downgrades HTTPS connections to HTTP, letting attackers intercept and read sensitive data in plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly