General Cyber Flashcards
What is a SCADA network?
SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation.
What is TACACS+ used for?
TACACS+ is used on AAA servers. authentication, authorization, and accounting services.
What is tarpitting?
A tarpit is a service on a computer system that purposely delays incoming connections.
What is PFS?
PFS (Perfect Forward Secrecy) is an additional security layer for your VPN connection. The primary purpose of using PFS is to ensure the security and confidentiality of all past and future communication and traffic even though the current key is compromised.
Is 3DES Symmetric or Asymmetric encryption?
Symmetric
Is AES Symmetric or Asymmetric encryption?
Symmetric
AES, Blowfish, DES, Triple DES, Serpent, and Twofish are what kind of encryption?
Symmetric
RSA , DIFFLE, ELLIPTICAL KEY are what kind of encryption?
Asymmetric
What is Diffie–Helman?
Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public(insecure) channel and was one of the first public-key protocols.
Combining Bobs Private Key and Alices Public Key yields the same key as Alices Private Key and Bobs Public key.
What is IVR?
Interactive voice response is a technology that allows a computer to interact with humans through the use of voice and DTMF (Dial Tone Multi Frequency) tones input via a keypad.
Which of these would be the most useful attack to gain access to a WPA2-PSK network?
Dictionary Attack
Which encryption uses large prime numbers to encrypt public keys?
RSA
What is a buffer overflow?
A buffer overflow is when user input overflows the size of the accepting buffer and is written into memory. Attackers use buffer overflows to insert malicious code into a program
How to prevent a buffer overflow?
Write the application to make sure the application doesn’t allow anything to write into memory where it isn’t expected.
What is a good way to prevent an Evil Twin?
Don’ broadcast the SSID of the network
What is a rouge access point?
an access point that can be plugged into your network that allows unauthorized access.
how to prevent rouge access point?
802.1x requires authentication for resources on network. uses NAC (network access control)
What is 802.1x
standard for NAC (Network Access Control)
What is EAP?
The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet.
________ involves altering the operating system to install applications from an unofficial source.
sideloading
What technique does a hacker use to identify the type of operating system or application running on a target system?
Banner grabbing
________ are used to crack WPA/WPA2 passwords by making educated guesses using a pre-defined list of possible passwords.
Dictionary attacks
_________ was intended to be an open source encryption protocol from its inception. The patents expired on other listed protocols, or they were initially classified and not available to the public.
Blowfish
___________ attack involves sending fragmented TCP/IP packets to a target. The victim is unable to properly reconstruct the order of the packets, but the overlap of the fragments causes this to fail, resulting in a DoS for the victim.
Teardrop
___________ gateway is a type of firewall that operates at the session layers of the OSI model. They can also operate as a ‘shim-layer’ between the transport and application layers of the TCP/IP stack. Their function is to monitor the TCP handshaking between packets, determining whether a requested session is legitimate.
Circuit-level
_______ systems are found in numerous household applicances (washing machine), and can be used in both smaller portable devices (digital watch) and large static installations (traffic light).
Embedded
How can sniffers be mitigated and broadcast traffic be decreased?
VLAN
IEEE 802.1q defines what?
Ethernet Frame VLAN Tagging
What port does the basic TACACS+ protocol use?
TCP 49
How does EAP-FAST provide authentication?
Protected Access Credentials (PAC)
What is WPS and what does it do?
WPS stands for Wi-Fi Protected Setup. it was originally called Wi-Fi Simple Config. 7 That’s because we wanted to find a way to get people to connect to a wireless network securely, but do it in a way that would not require inputting any complicated passphrases.
There’s a lot of different ways to connect to a WPS enabled network. One might be to use a PIN that’s connected on an access point. One might be that you push a button on the front of the access point.
primary differences between an incremental and differential backup
B. Incremental backups take less time to complete
C. Differential backups only back up files since the last full backup
What is the difference between an isolated/segmented VLAN and an air gap?
An isolated VLAN does not allow network access. An air gap, unless completely isolated does.