E5 Flashcards
<p>Exam Question 201 (p.269)Why are weak passwords a significant problem in networks?</p>
<p>Because hackers get in and cause trouble.</p>
<p class=”large” style=”text-align:center”;>Exam Question 202 (p.269):List three true measures of password quality.</p>
<p class=”large” style=”text-align:center”;>Is it easy for you to remember? Is it dicult to guess? Is it difficult forothers to remember</p>
<p>Exam Question 203 (p.269):What is a dictionary attack?</p>
<p>It is using a long list of likely passwords in hopes of finding one that works</p>
<p class=”large” style=”text-align:center”;>Exam Question 204 (p.269):List two types of bad passwords.</p>
<p class=”large” style=”text-align:center”;>a) anything short, (b) anything in a dictionary.</p>
<p class=”large” style=”text-align:center”;>Exam Question 205 (p.269):What do I recommend for a password?</p>
<p class=”large” style=”text-align:center”;>initials of a familiar phrase</p>
<p>Exam Question 206 (p.269):What is a high-value password?</p>
<p>A password to protect a high-value asset.</p>
<p class=”large” style=”text-align:center”;>Exam Question 207 (p.269):What is a low-value password?</p>
<p class=”large” style=”text-align:center”;>A password to protect a low-value asset.</p>
<p>Exam Question 208 (p.269):Does it matter if a low-value password is easy to guess?</p>
<p>Not much.</p>
<p class=”large” style=”text-align:center”;>Exam Question 209 (p.269):List four ways to prove identity.</p>
<p class=”large” style=”text-align:center”;>What you have. What you know. What you are. What you can do.</p>
<p class=”large” style=”text-align:center”;>Exam Question 210 (p.269):What is multi-factor authentication?</p>
<p class=”large” style=”text-align:center”;>Several UNRELATED factors must be presented.</p>
<p>Exam Question 211 (p.269):What is single sign-on?</p>
<p>You authenticate once and then receive credentials that are (a) used onrelated websites (b) in place of authenticating again.</p>
<p class=”large” style=”text-align:center”;>Exam Question 212 (p.269):What is a hacker?</p>
<p class=”large” style=”text-align:center”;>Someone that goes beyond the routine ways of using a tool.</p>
<p class=”large” style=”text-align:center”;>Exam Question 213 (p.269):Is hacking bad?</p>
<p class=”large” style=”text-align:center”;>no</p>
<p>Exam Question 214 (p.269):What does black hat mean?</p>
<p>It means a bad-guy hacker</p>
<p class=”large” style=”text-align:center”;>Exam Question 215 (p.269):What does white hat mean?</p>
<p class=”large” style=”text-align:center”;>It means a good-guy (ethical) hacker.</p>
<p class=”large” style=”text-align:center”;>Exam Question 216 (p.269):What is pen testing?</p>
<p class=”large” style=”text-align:center”;>penetration testing</p>
<p>Exam Question 217 (p.269):What are symmetric keys?</p>
<p>Encryption keys that cancel each other out are symmetric.</p>
<p class=”large” style=”text-align:center”;>Exam Question 218 (p.269):What does rot13 stand for?</p>
<p class=”large” style=”text-align:center”;>rotate thirteen</p>
<p class=”large” style=”text-align:center”;>Exam Question 219 (p.269):How does rot13 work?</p>
<p class=”large” style=”text-align:center”;>Each letter is replaced by the one 13 places away.</p>
<p>Exam Question 220 (p.270):Who knows Alice's public key?</p>
<p>everybody</p>
<p class=”large” style=”text-align:center”;>Exam Question 221 (p.270):Who knows Alice’s private key?</p>
<p class=”large” style=”text-align:center”;>Alice</p>