Day 15 Flashcards

1
Q

The obfuscation of information within a common looking format that achieves stealth.

A

Stego

Stenography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four pairs of wires wrapped in foil that is grounded to prevent interference and eavesdropping.

A

STP

Shielded Twisted Pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of a single value to hide and then reveal information.

A

Symmetric Key

Secret Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system used by enterprises to protect the intranet from hostile or unsecured traffic, commonly implemented in a cloud-based solution.

A

SWG

Secure Web Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This was initially used by Cisco as centralized authentication for its routers and switches.

A

TACACS+

Terminal Access Controller Access Control System Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This defines four different services (discovery, collection, inbox and polling) for the purpose of sharing intelligence and threat information between organizations.

A

TAXII

Trusted Automated eXchange of Indicator Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An upper layer protocol that requires handshakes, acknowledgments and a graceful close.

A

TCP

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a command Linux based network analysis tool.

A

TCPDump

Wireshark alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is returned after a user successfully. Authenticates to a KDC.

A

TGT

Ticket Granting Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A protocol for key management and change used by WPA.

A

TKIP

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is now incorporated into HTTPS and allows for AES and other more recent cryptographic algorithms.

A

TLS

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A physical token-based authentication system with an access code that changes regularly.

A

TOTP

Time-based One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A cryptographic chipset that contains key information to allow encryption and ensure device integrity.

A

TPM

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a methodology of approaching a target by disguising one thing or activity is something trustworthy to achieve insertion.

A

Trojan

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The component of the name resolution message that performs authentication in DNSSEC.

A

TSIG

Transaction Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A reference to the patterns of actions or methods that can be associated with specific threat actors.

A

TTP

Tactics, Techniques, and Procedures

17
Q

This is the phase of development wherein the client decides if it is correct.

A

UAT

User Acceptance Testing

18
Q

The tools and resources used to analyze insider threats and to proactively prevent fraud and exfiltration.

A

UEBA

User and Entity Behavior Analytics

19
Q

Software that may be implemented to protect devices, servers and other endpoints from a variety of threats that can be managed from a single interface.

A

UEM

Unified Endpoint Management

20
Q

Remotely piloted aircraft.

A

UAV

Unmanned Aerial Vehicle

21
Q

A datagram protocol that has no handshake, close or acknowledgment requirement.

A

UDP

User Datagram Protocol

22
Q

An upper layer protocol that does not require acknowledgment.

A

UDP

User Datagram Protocol

23
Q

The modern solution for the boot up environment of computer.

A

UEFI

Unified Extensible Firmware Interface

24
Q

This is typically a battery-powered device that provides temporary electric support.

A

UPS

Uninterruptable Power Supply

25
Q

This is the file/resource portion of an URL, typically located at the end.

A

URI

Uniform Resource Identifier

26
Q

An extension of the USB specification that allows it to integrate with devices such as tablets and smart phones.

A

USB OTG

USB On The Go

27
Q

Multiplatform specification for integrating peripherals into computer systems.

A

USB

Universal Serial Bus