Block 2 - Unit 6 Flashcards

1
Q

______________________ attacks occur when more requests are sent to a machine (host) than it can handle

A

Denial of Service - DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______________________ attacks allow access to some resources that your machine should not provide to the attacker

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executing commands illicitly occurs when a(n) ___________ and ____________ person executes commands on a server

A

Unknown and untrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The two types of destructive behavior are ______ _______ and _______ ___________

A

Data diddling and Data destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The destructive behavior where the attacker changes entries in records is known as _______ __________

A

Data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The destructive behavior where the attacker deletes files is known as _______ _________

A

Data destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Securing the mechanisms of the internet include _______________, ____________ and ________________

A
  • Securing the protocols
  • Improving Internet routing
  • Improving management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which mechanism’s goal for securing the internet ensures the reliability and security of three key protocols?

A

Securing the protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of-band management

A

Improving Internet routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What benefit is gained by improving address verification?

A

The source of a DoS attack could be determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?

A

Reduce and remediate software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The identity management objective that alerts the recipient of unauthorized modification to cyber information is called __________ ____________

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What goal of identity management protects data from unauthorized review?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What goal of identity management verifies you are who you say you are?

A

Authentication and Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the Air Force meet the goals of identity management?

A

DoD Public Key Infrastructure - PKI and Common Access Card - CAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which PKI certificate identifies you to the network?

A

Identification cert

17
Q

Which PKI certificate contains your public key that is used to verify the digital signature on the e- mail messages?

A

Email signature cert

18
Q

Which PKI certificate contains your public key used to encrypt e-mail?

A

Email encryption cert

19
Q

How is your private key protected?

A

6-8 digit PIN

20
Q

What is the purpose of a common access card?

A
  • Allow access to network devices and applications

- Sign and encrypt emails

21
Q

Why is it important to change an (SSID) service set identifier?

A

To not become an easy target for attack

22
Q

Why is it important to change administrator passwords and user names on a wireless Web page?

A

Default usernames and passwords are well known

23
Q

Which wireless network security guidelines supports keying in the MAC address of authorized devices?

A

MAC address filter

24
Q

Why is enabling DHCP a bad idea on a wireless network?

A

Anyone can be given an IP adress upon connecting to the network