Block 2 - Unit 6 Flashcards
______________________ attacks occur when more requests are sent to a machine (host) than it can handle
Denial of Service - DoS
______________________ attacks allow access to some resources that your machine should not provide to the attacker
Unauthorized access
Executing commands illicitly occurs when a(n) ___________ and ____________ person executes commands on a server
Unknown and untrusted
The two types of destructive behavior are ______ _______ and _______ ___________
Data diddling and Data destruction
The destructive behavior where the attacker changes entries in records is known as _______ __________
Data diddling
The destructive behavior where the attacker deletes files is known as _______ _________
Data destruction
Securing the mechanisms of the internet include _______________, ____________ and ________________
- Securing the protocols
- Improving Internet routing
- Improving management
Which mechanism’s goal for securing the internet ensures the reliability and security of three key protocols?
Securing the protocols
Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of-band management
Improving Internet routing
What benefit is gained by improving address verification?
The source of a DoS attack could be determined
Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?
Reduce and remediate software vulnerabilities
The identity management objective that alerts the recipient of unauthorized modification to cyber information is called __________ ____________
Data integrity
What goal of identity management protects data from unauthorized review?
Confidentiality
What goal of identity management verifies you are who you say you are?
Authentication and Identification
How does the Air Force meet the goals of identity management?
DoD Public Key Infrastructure - PKI and Common Access Card - CAC
Which PKI certificate identifies you to the network?
Identification cert
Which PKI certificate contains your public key that is used to verify the digital signature on the e- mail messages?
Email signature cert
Which PKI certificate contains your public key used to encrypt e-mail?
Email encryption cert
How is your private key protected?
6-8 digit PIN
What is the purpose of a common access card?
- Allow access to network devices and applications
- Sign and encrypt emails
Why is it important to change an (SSID) service set identifier?
To not become an easy target for attack
Why is it important to change administrator passwords and user names on a wireless Web page?
Default usernames and passwords are well known
Which wireless network security guidelines supports keying in the MAC address of authorized devices?
MAC address filter
Why is enabling DHCP a bad idea on a wireless network?
Anyone can be given an IP adress upon connecting to the network