Basic Flashcards
What type of cryptographic algorithm is 3DES.
symmetric
What type of cryptographic algorithm is RSA
Asymmetric
What type of cryptographic algorithm is ECC
Asymmetric
Detection and analysis for remote workstations
Behavior
What type of vulnerabilities involve leveraging access from a VM to other machines on the hypervisor?
VM escpace
Best device to proactively stop outside attackers from reaching internal network.
IPS
What type of data breach would require the US Dept of health and human services and media be notified if 500 individuals are affected.
protected health information (PHI).
Bio metric feature for matching petterns on the eyes surface using near-infrared imaging.
Iris scan
What is port 53 used for?
DNS
What is port 80 used for?
HTTP
What is port 25 used for?
SMTP
What is port 69 used for?
TFTP or trivial file transfer protocol that has no user authentication.
SHA-2 creates what bit fixed output.
256
MD-5 creates what bit fixed output?
128
RIPEMD creates what bit fixed output?
160
First step in creating disaster recovery plan?
Identify the organization’s assets.
First step for a Incident Response process?
Preparation
Second step for a Incident Response process?
Identification
Third step for a Incident Response process?
Containment
Fourth step for a Incident Response process?
Eradication
Breach of PCI-DSS is to be reported to whom?
Visa and Mastercard
War walking is what type of threat or attack?
By walking around finding wireless networks and devices.
Race condition is what type of vulnerability?
Outcome of execution is dependent on certain events. EX. Hacker changes a config file to gain lives for free.