Domain 3 virtualization&architecture Flashcards
s2.20 What is DCE? Verus what is this system? Why use DCEs?
Distributed computing environment. Not a centeralized system. It gives us horizaotnal scaling. modualr grwoth ,fault tolerance, coste effectiveness, low laency.
s2.20 Grid vs HPC system. Edge vs CDN?
Grid is different. it uses what ever resoruce is available. Edge is closest to where it is needed. Not all edge is cdn. all cdns are edge.
s2.22 What is emanation? What is steganography? what is cover timing channel?
2ndary information given. Unintentional signals. Steg: it is midden message within another media. Covert timing is manipulating the timing of events to covertly transmit information.
s2.23 exam tip on malware
You will not a get definition of a malware. it will ask how to protect by words like embedded, alter signature.
s2.24 What are rootkits?
Malware. Replace some of the OS/Kernel with a malicious payload. User rootkits work on ring 3 and kernel rootkits on ring 0
s2.24 What are packers?
programs to compress *.exe files, which can be used to hid malware in a executable neutral technology. Trojan file. Changes the hash
s2.24 what can help with server side atacks? Can firewalls help with client side attacks?
defense in depth can mitigate some of these. Firewalls do not help. they only monitor inbound traffic.
s2.25 8min great exam tip
s2.26 What is polyinstantiation? What is aggregation?
alternative facts. two or more instance of the same file depending on who accesses it. Aggregation is collection of data for the purpose of statistical analysis.
s2.28 What is SCADA Supervisory Conrol and Data Acquistion?
Control system architecture that uses comptuers, networked data communications and GUI for high level process supervisory management. It uses the DNP3 Distributed Network Protocal .
s2.29 What is difference between Cryptology and crypotgraphy? What is cipher?
Crptology is the science of securing communication. Crypotography is the study of creing messages where the meaning is hidden. Cipher is a cyptographi algorithm.
s2.31 What is spartan scytale?
Message written lengthwise on a long thin pieceof parchment wrapped in a stick. By itself it is no sense but if rewrapped around a stick of hte same diameter it would be decipherable.
s2.31 What is caesar cipher?
done by switching letters by a certain number of spots in the alphabet.
s2.31Vigenere cipher?
16th century. alphabet is repeated 26 times to form a matrix.
s2.31 What is cipher disk?
2 concertric disk with alphabets on them.
s2.31 What is purple?
japanese rotary based very similar to the enigma. 3 rotors. German enigma is 4 rotors.
s2.32 What is one time pad in cryptogprahy?
Algorithm where plaintext is combined with a random key. Unbreakable but very iimpractical. Charactered must be random
s2.32 What is vernam cipher?
1st known use of one time pad. Used in bits and bits were XOR’d in plaintext bits.
s2.32 Project VENONA?
US and UK broke KGB one time pad. KGB reused pads and many messages were decoded.
s2.32 What is Jefferson Disk (Bazeries Cylinder)?
a cipher system each with 26 letters around the edge. each disk hasa unique number. the order of the disk is the cipher key. Both sender and receiver must arrange the disk in the same predefined order.
s2.32 What is Sigaba?
US version of the enigma. It has 3x5 = 15 set of rotors. no successful cryptanalysis known.
s2.32 what is cocom and wassenaar arrangement?
cocom prevent the export of critical tech. ended in 94. Wassenaar is from 96 to now. limits exports for dual use tech. crypotgraphy is part of that.
s2.32 What is monoaplhabetic substitution?
Its a cipher text encryption using frequency to replace each letter of the plain text. Frequency analysis is an attack message
s2.32 What is transposition? What is substitution?
IT is a cryptographic method that rearranging the letters of the plaintext. Substitution is replacing the plaintext symbols with other symbols.