Day 15 Flashcards

1
Q

The obfuscation of information within a common looking format that achieves stealth.

A

Stego

Stenography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four pairs of wires wrapped in foil that is grounded to prevent interference and eavesdropping.

A

STP

Shielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of a single value to hide and then reveal information.

A

Symmetric Key

Secret Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system used by enterprises to protect the intranet from hostile or unsecured traffic, commonly implemented in a cloud-based solution.

A

SWG

Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This was initially used by Cisco as centralized authentication for its routers and switches.

A

TACACS+

Terminal Access Controller Access Control System Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This defines four different services (discovery, collection, inbox and polling) for the purpose of sharing intelligence and threat information between organizations.

A

TAXII

Trusted Automated eXchange of Indicator Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An upper layer protocol that requires handshakes, acknowledgments and a graceful close.

A

TCP

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a command Linux based network analysis tool.

A

TCPDump

Wireshark alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is returned after a user successfully. Authenticates to a KDC.

A

TGT

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A protocol for key management and change used by WPA.

A

TKIP

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is now incorporated into HTTPS and allows for AES and other more recent cryptographic algorithms.

A

TLS

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A physical token-based authentication system with an access code that changes regularly.

A

TOTP

Time-based One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A cryptographic chipset that contains key information to allow encryption and ensure device integrity.

A

TPM

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a methodology of approaching a target by disguising one thing or activity is something trustworthy to achieve insertion.

A

Trojan

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The component of the name resolution message that performs authentication in DNSSEC.

A

TSIG

Transaction Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A reference to the patterns of actions or methods that can be associated with specific threat actors.

A

TTP

Tactics, Techniques, and Procedures

17
Q

This is the phase of development wherein the client decides if it is correct.

A

UAT

User Acceptance Testing

18
Q

The tools and resources used to analyze insider threats and to proactively prevent fraud and exfiltration.

A

UEBA

User and Entity Behavior Analytics

19
Q

Software that may be implemented to protect devices, servers and other endpoints from a variety of threats that can be managed from a single interface.

A

UEM

Unified Endpoint Management

20
Q

Remotely piloted aircraft.

A

UAV

Unmanned Aerial Vehicle

21
Q

A datagram protocol that has no handshake, close or acknowledgment requirement.

A

UDP

User Datagram Protocol

22
Q

An upper layer protocol that does not require acknowledgment.

A

UDP

User Datagram Protocol

23
Q

The modern solution for the boot up environment of computer.

A

UEFI

Unified Extensible Firmware Interface

24
Q

This is typically a battery-powered device that provides temporary electric support.

A

UPS

Uninterruptable Power Supply

25
This is the file/resource portion of an URL, typically located at the end.
URI Uniform Resource Identifier
26
An extension of the USB specification that allows it to integrate with devices such as tablets and smart phones.
USB OTG USB On The Go
27
Multiplatform specification for integrating peripherals into computer systems.
USB Universal Serial Bus