E5 Security Flashcards

1
Q

Why are weak passwords a significant problem in networks?

A

Because hackers can get in and cause troubles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List three true measures of password quality.

A

Is it easy for you to remember? Is it difficult to guess? Is it difficult for others to remember?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a dictionary attack?

A

It is using a long list of likely passwords in hope of finding one that works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List two types of bad passwords.

A

(a) anything short, (b) anything in a dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do I recommend for a password?

A

Initials of a familiar phrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a high-value password?

A

A password to protect a high-value asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a low-value password?

A

A password to protect a low-value asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Does it matter if a low-value password is easy to guess?

A

Not much

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List four ways to prove identity.

A

What you have. What you know. What you are. What you can do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is multi-factor authentication?

A

Several UNRELATED factors must be presented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is single sign-on?

A

You authenticate once and then receive credentials that are (a) used on related website (b) in place of authenticating again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a hacker?

A

Someone that goes beyond the routine ways of using a tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is hacking bad?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does black hat mean?

A

It means a bad-guy hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does white hat mean?

A

It means the good-guy (ethical) hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is pen testing?

A

penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are symmetric keys?

A

Encryption keys that cancel each other out are symmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does rot13 stand for?

A

rotate thirteen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does rot13 work?

A

Each letter is replaced by the one 13 places away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who knows Alice’s public key?

A

everybody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Who knows Alice’s private key?

A

alice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do you send a private message to Bob?

A

Encrypt it with Bob’s public key.

23
Q

What is the purpose of encrypting a message?

A

Prevent others from understanding it.

24
Q

What is the purpose of signing a message?

A

Prove authorship.

25
Q

How do you sign a message?

A

Encrypt it with your private key.

26
Q

How does signing prove authorship?

A

Only with the person with a private key could have encrypted it. They must be the source.

27
Q

How can Bob send a private, authenticated message to Alice?

A

First, encrypt it with Bob’s private key to prove authorship. Second, encrypt the result with Alice’s public key to provide privacy.

28
Q

Why are public-key systems special?

A

They let us create a shared secret between parties that did not already know each other.

29
Q

Why is RSA special?

A

It easily creates good public key.

30
Q

What is a prime number?

A

A number with no proper factors.

31
Q

Why are prime numbers used in encryption?

A

It is easy to multiply two large prime numbers, but it is difficult to find the original numbers.

32
Q

What does the RSA private key consist of?

A

Two large prime numbers are chosen.They are the private key

33
Q

What does the RSA public key consist of?

A

The large number of the private key are multiplied together. The result is the public key

34
Q

If RSA is so great, why are other things used?

A

other things are faster

35
Q

Is http considered to be secure? Why?

A

No. Traffic (data) is not encrypted.

36
Q

Is https considered to be secure? Why?

A

Yes. Traffic (data) is encrypted.

37
Q

What does SSL stand for?

A

secure socket layers

38
Q

What does TLS stand for?

A

transport layer security

39
Q

How does SSL protect confidentiality of a TCP connection?

A

Traffic is encrypted to hide its meaning

40
Q

What is an Outside Threat?

A

A threat by a machine outside your LAN

41
Q

What is a botnet?

A

A network of computers comtrolled by a hacker, usually without the knowledge of their real owners.

42
Q

For what two things are botnets commonly used?

A

Sending spam, Doing attacks

43
Q

What does DDOS stand for?

A

distributed denial of service

44
Q

What is a zombie?

A

a computer that is part of a botnet.

45
Q

What does PWN stand for?

A

own

46
Q

What is an Inside Threat?

A

A threat by a machine inside your LAN

47
Q

What two things does server mean?

A

A program that provides service, a computer where such a program runs.

48
Q

How can firewalls mitigate network attacks against servers?

A

They can control the number of incoming requests based on IP address.

49
Q

How can firewalls mitigate network attacks against clients?

A

They can prevent all uninvited access from outside the LAN.

50
Q

What does DMZ stand for?

A

demilitarized zone

51
Q

What service does DMZ provide?

A

It directs unexpected network traffic on all ports to one designated machine.

52
Q

What service does port forwarding provide?

A

It directs unexpected network traffic on a few ports to a designated machine.

53
Q

How can sharing your Wi-Fi be dangerous?

A

Bad people might get directly into your LAN. This bypasses your main Firewall.