MISC Flashcards
In AD, Kerberos does what?
network authentication
CIA stands for?
Confidentiality
Integrity
Availability
AAA stands for?
Authentication
Authorization
Accounting/Auditing
3 AD group types?
Domain Local
Global
Universal
TKIP stands for?
Temporal Key Integrity Protocol
encryption
WPA stands for?
Wi-Fi Protected Access
IV stands for?
Initializing Vector
encryption
AES stands for?
Advanced Encryption Standard
AES (Advanced Encryption Standard) is used in what type of encrypting standard?
WPA2
WPA2 stands for?
Wi-Fi Protected Access 2
PKI stands for?
Public Key Infrastructure
PKI (Public Key Infrastructure) does?
certificate encryption
DNSSEC stands for?
Domain Name system Security Extensions
WUA stands for?
Windows Update Agent
WUA (Windows Update Agent) does?
Controls updates for individual clients
NAP stands for?
Network Access Protection
NAP (Network Access Protection) does?
enforces client configuration compliance
5 classes of firewall?
Class 1 - Personal firewall Class 2 - Router firewall Class 3 - Low end hardware firewall Class 4 - High end hardware firewall Class 5 - High end server firewall
HRA stands for?
Health Registration Authority
NPS stands for?
Network Policy Service
TLS stands for?
Transport Layer Security
TLS (Transport Layer Security) does?
current extension of SSL encryption
2 mail encryptions are?
Pretty Good Privacy (PGP)
Secure/Multipurpose Internet Mail Extensions (S/MIME)
S/MIME stands for?
Secure/Multipurpose Internet Mail Extensions
PGP encrypts how?
public & session keys
S/MIME does?
embeds objects
4 types of VPN tunneling protocols?
PPTP
L2TP
SSTP
IKEv2
PPTP stands for?
Point to Point tunneling Protocol
L2TP stands for?
Layer 2 Tunneling Protocol
SSTP stands for?
Secure Sockets Tunneling Protocol
IKEv2 stands for?
Internet Key Exchange version 2
Which VPN tunneling protocol has old, weak encryption?
PPTP
Which VPN tunneling protocol supports VPN Reconnect?
IKEv2
Which VPN tunneling protocol is industry standard?
L2TP
4 types of VPN authentication forms?
PAP
CHAP
MS-CHAPv2
EAP-MS-CHAPv2
PAP stands for?
Password Authentication Protocol
CHAP stands for?
Challenge Handshake Authentication Protocol
MS-CHAPv2 stands for?
Microsoft CHAP version 2
EAP-MS-CHAPv2 stands for?
Extensible Authentication Protocol Microsoft CHAP version2
Which VPN authentication form can authenticate, via biometrics and “what you have?”
EAP-MS-CHAPv2
Which VPN authentication form uses plaintext and is not recommended?
PAP
What is the best symmetric encryption?
AES
5 types of symmetric encryption?
Block ciphers DES 3DES AES Stream cipher
Block cipher symmetric encryption works how?
plaintext with a key
DES symmetric encryption has how many bits?
56 bits
Which symmetric encryption is less vulnerable than DES?
3DES encryption
Stream cipher symmetric encryption works how?
bit-by-bit
DES stands for?
Data Encryption Standard
AES stands for?
Advanced Encryption Standard
4 types of asymmetric encryption?
SSL
TLS
PGP
Hash function
TLS stands for?
Transport Layer Security
encryption
PGP stands for?
Pretty Good Privacy
encryption
Hash function asymmetrical encryption works how and used for what?
encrypts one way, with no decryption
verifies passwords
types of certificate formats?
PKCS #12
PKCS #7
DER
Base-64 encoded X.509
PKCS #12 certificates do?
archive files
PKCS #7 certificates do?
stores certificates
Base-64 encoded X.509 certificates do?
stores single certificate but no pvt key
PKI stands for?
Public Key Infrastructure
PKI does?
digital certificate system
2 types of CA?
Enterprise Root CA
Stand-alone CA
Enterprise Root CA does what?
top of CA hierarchy
Stand-alone CA does not do what 2 things?
use AD
automatically enroll visitors
RA stands for?
Registration Authority
RA does?
distributes keys
CRL stands for?
Certificate Revocation List
Device Guard is and does?
lockdown device using code integrity policies to only run trusted apps
A changing virus is called what?
polymorphic
When an administrator grants permissions on a folder to a group, which three permission levels are assigned by default?
Read
Read & execute
List folder contents
Which two permission levels are available to assign to a user or group when creating a basic share on a folder?
Read
Write
Which registry hive stores file associations?
HKEY_CLASSES_ROOT
On which Group Policy path will an administrator find the Account Policies area?
Computer Configuration/Policies/Windows Settings/Security Settings
What is used to audit non-Active Directory objects?
Object access
Which administrative tool is used to read auditing logs?
Event Viewer
Which of these encryption methods uses block ciphers? Choose three answers.
AES
DES
3DES
For corporations, what 2 services manage updates?
Windows Server Update Service (WSUS)
System Center Configuration Manager (SCCM)
WSUS stands for?
Windows Server Update Service
SCCM stands for?
System Center Configuration Manager
802.1x uses what server?
RADIUS
802.1x does what?
port based network authentication
Firewall packet filtering operates at what OSI layer?
Layer 3
Firewall circuit filtering operates at what OSI layer?
Layer 5
3rd generation firewalls operate at what OSI layer?
Layer 7 (AKA application firewalls/proxy servers)
Stateless firewalls filter based on what?
packet: type, port number, source & destination IP
Stateful firewalls filter based on what?
everything stateless does and allows return traffic that is part of the OSI Session
Distance vector routing does what 2 things?
hop count
split horizon loop prevention
Link state routing does what 3 things?
hop count
distance
speed
3 types of protocol spoofing
ARP (Address Resolution Protocol) spoofing
DNS (Domain Name System) spoofing
IP Address spoofing
ARP (Address Resolution Protocol) spoofing works how?
stealing host IP address and sending its traffic to attacker
DNS (Domain Name System) spoofing works how?
redirects web request to incorrect website
IP Address spoofing works how?
IP packets attacked and their source forged
IPsec protocol, ESP (Encapsulating Security Payload), does?
provides CIA for only IP data
ESP stands for?
Encapsulating Security Payload
AH stands for?
Athentication Header
IPsec protocol AH (Athentication Header) does?
authentication, integrity, and anti-replay for data packets
IPsec protocol AH (Athentication Header) does not do?
encryption
IPsec protocol IKE (Internet Key Exchange) does?
defines encryption key exchange
IKE stands for?
Internet Key Exchange
SA stands for?
Security Association
re: IPsec protocol
SA (Security Association) does?
rules for VPN connections
Which are the two IPsec modes?
Transport Mode
Tunnel Mode