BATTLE VICTORY Flashcards
X is a standalone malicious programs that replicate, execute, and spread across network connections independently, without human intervention
Computer worms
Which file permission that allow a user to view only the file shared
READ
Next step taken after technician identify the problems in troubleshooting process
Establish a theory of probable cause
Security practice to protect wireless router from dictionary attack
Use WPS instead of WEP
Main function of data wiping
Overwriting the data to completely destroy all reside electronic data
Username cannot contain < or _
WRONG
Man-in-the-Middle is one of an example of Access Attack
CORRECT
Technique used by the attackers use image files to hide some information for malicious purposes
Steganography. Steganography hides the existence of the message. It replaces bits of unused data into the usual files such as graphic, sound, text, audio and video with some other surreptitious bits
U ARE REALLY GOOD in Caesar ciphertext
X DUH UHDOOB JRRG
One example of hash method
MD5/ SHA1 / SHA-512/256 / CRC32
Technology that should be implemented to ensure data confidentiality as data is transmitted in the following situation.
“An organization allows employees to work from the outside network to access the data for a specific purpose”
VPN
Purpose of the AAAA Record in Domain Name System (DNS) record
IPv6 address resolution record
Type of hacker that performs an attack on the system by using tools and knowledge found on the internet
Script Kiddies
Dehashing is a process to reverse hash back to the original data
WRONG
Spear phishing randomly attack its victim by sending an email involve an attachment that loads malware into computer
WRONG. Spear phishing is a very targeted type of phishing activity