Basic Flashcards
What type of cryptographic algorithm is 3DES.
symmetric
What type of cryptographic algorithm is RSA
Asymmetric
What type of cryptographic algorithm is ECC
Asymmetric
Detection and analysis for remote workstations
Behavior
What type of vulnerabilities involve leveraging access from a VM to other machines on the hypervisor?
VM escpace
Best device to proactively stop outside attackers from reaching internal network.
IPS
What type of data breach would require the US Dept of health and human services and media be notified if 500 individuals are affected.
protected health information (PHI).
Bio metric feature for matching petterns on the eyes surface using near-infrared imaging.
Iris scan
What is port 53 used for?
DNS
What is port 80 used for?
HTTP
What is port 25 used for?
SMTP
What is port 69 used for?
TFTP or trivial file transfer protocol that has no user authentication.
SHA-2 creates what bit fixed output.
256
MD-5 creates what bit fixed output?
128
RIPEMD creates what bit fixed output?
160