Block 2 Unit 4 Flashcards

1
Q

__ attcks occur when more requests are sent to a machine(host) than it can handle

A

DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____________ attacks allow access to some resources that your machine should not provide to the attacker

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executing commands illicitly occurs when a ___ and _________ person executes commands on a server.

A

unknown, untrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The two types of destructive behavior are ______ and ____________.

A

data diddling

data destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The destructive behavior where the attacker changes entries in records is known as?

A

Data Diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The destructive behavior where the attacker deletes file is known as?

A

Data Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

securing the mechanism of the internet include?

A

securing the protocols, improving internet routing and improving management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which mechanism’s of the internet ensures the reliability and security of three key protocols?

A

Secure the Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of- band management?

A

Improve internet routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What benefit is gained by improving address verification?

A

Identify the source of DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?

A

Reduce and remediate software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The identity management objective that alerts the recipient of unauthorized modification to cyber info is called?

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What goal of identity management protects data from unauthorized review?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What goal of identity management verifies you are who you say you are?

A

Authentication and ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the Air Force meet the goals of identity management?

A

DOD PKI and CAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which PKI certificate identifies you to the network?

A

Identity certificate

17
Q

Which PKi certificate contains your public key that is used to verify the digital signature on the email message?

A

Email signature certificate

18
Q

Which PKi certificate contains your public key used to encrypt e-mail?

A

Email Encryption Certificate

19
Q

How is your private key protected?

A

By a 6-8 PIN

20
Q

What is the purpose of a common access card?

A

Building and security access, as well as access to PKI applications

21
Q

Why is it important to change an(SSID) service set identifier?

A

Identifies a poorly configured Wi-Fi

22
Q

Why is it important to change administrator passwords and user names on a wireless Web page?

A

they are simple and well-known to hackers

23
Q

which wireless network security guidelines supports keying in the MAC address of authorized devices?

A

MAC Filtering

24
Q

Why is enabling DHCP a bad idea on a wireless network?

A

Hackers can easily obtain a valid IP address