Block 2 Unit 4 Flashcards
__ attcks occur when more requests are sent to a machine(host) than it can handle
DOS
____________ attacks allow access to some resources that your machine should not provide to the attacker
Unauthorized access
Executing commands illicitly occurs when a ___ and _________ person executes commands on a server.
unknown, untrusted
The two types of destructive behavior are ______ and ____________.
data diddling
data destruction
The destructive behavior where the attacker changes entries in records is known as?
Data Diddling
The destructive behavior where the attacker deletes file is known as?
Data Destruction
securing the mechanism of the internet include?
securing the protocols, improving internet routing and improving management
Which mechanism’s of the internet ensures the reliability and security of three key protocols?
Secure the Protocols
Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of- band management?
Improve internet routing
What benefit is gained by improving address verification?
Identify the source of DOS attacks
Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?
Reduce and remediate software vulnerabilities
The identity management objective that alerts the recipient of unauthorized modification to cyber info is called?
Data Integrity
What goal of identity management protects data from unauthorized review?
Confidentiality
What goal of identity management verifies you are who you say you are?
Authentication and ID
How does the Air Force meet the goals of identity management?
DOD PKI and CAC
Which PKI certificate identifies you to the network?
Identity certificate
Which PKi certificate contains your public key that is used to verify the digital signature on the email message?
Email signature certificate
Which PKi certificate contains your public key used to encrypt e-mail?
Email Encryption Certificate
How is your private key protected?
By a 6-8 PIN
What is the purpose of a common access card?
Building and security access, as well as access to PKI applications
Why is it important to change an(SSID) service set identifier?
Identifies a poorly configured Wi-Fi
Why is it important to change administrator passwords and user names on a wireless Web page?
they are simple and well-known to hackers
which wireless network security guidelines supports keying in the MAC address of authorized devices?
MAC Filtering
Why is enabling DHCP a bad idea on a wireless network?
Hackers can easily obtain a valid IP address