Missed Test Questions Dion Training Flashcards

1
Q

What is DSA?

A

Digital Signature Algorithm

Asymmetric and is a Federal Information Processing Standard for digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is degaussing?

What are its effects on a hard drive?

A

It wipes the hard drive via demagnetizing.

The drive will be permanently un-usable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is purging a hard drive accomplished?

A
  • Using the device’s internal electronics
  • Degaussing
  • Using a cryptographic erase function (encrypt the data and throw away the key)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data wiping?

How many times does it overwrite?

What is it also known as?

Why would you data wipe?

A

Software tool to overwrite the data. Least secure of 3 methods because forensics can recover the wiped data.

1x, 7x, 35x (Higher = more secure)

Data clearing

Allows the hard drive to be re-used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the private IP address ranges?

A
  1. x.x.x (10.0.0.0 - 10.255.255.255)
  2. 16.0.0 - 172.31.255.255
  3. 168.x.x (192.168.0.0 - 192.168.255.255)

Note: All other IP addresses are public
Note: Exceptions are localhost and APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of key stretching?

A

To make a possibly weak key more secure against brute force attacks by increasing the time and resources to test each possible key.

This applies to hashes as well as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two key stretching libraries?

A

bcrypt

PBKDF2 - Password Based Key Derivation Function 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does an retina scan measure?

A

The retina blood vessels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does face recognition work?

A

Compares facial features of an image from a database to the verifying person in a digital image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a iris scan work?

A

Uses infrared light to take a high-contrast photo of the iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is signature kinetics?

A

Measures the users actions when signing their name and compares to a known good baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a PAM and what is it used for?

A

Pluggable Authentication Module

Its generally a device like a USB thumb drive that plugs in and is used as a software key in cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can a TPM perform cryptographic processing?

A

Yes, a TPM is itself a crypto-processor that stores private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What regulation protects the privacy of student educational records?

A

FERPA - Family Educational Rights and Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the GLBA?

A

Gramm-Leach-Biley Act

Requirements that help protect the privacy of an individual’s financial information held by financial institutions and others, such as tax preparation companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the SOX?

A

Sarbanes-Oxley Act

Requirements for businesses for storing and retaining documents about their financial and business operations.

Includes the type of documents to be stored and their retention periods.

Relevant for any publicly-traded company with a market value of at least $75 million.

17
Q

What is HIPPA?

A

Health Insurance Portability and Accountability Act

Rules and regulations regarding healthcare in the United States. Applies to electronic medical records.

18
Q

What is malware heuristic analysis?

A

Behavior-based detection and prevention. Used by many anti-virus programs. Designed to detect previously unknown computer viruses and new variants of viruses already in the wild.

19
Q

Is active or passive vulnerability scanning more likely to return false positives?

A

Passive has a high number of false positives

20
Q

What is Aircrack-ng?

A

Aircrack-ng is a complete suite of wireless security assessment and exploitation tools that includes monitoring, attacking, testing, and cracking of wireless networks. This includes packet capture and export of the data collected as a text file or pcap (packet capture) file.

21
Q

What is Nessus?

A

A vulnerability scanning tool.

Review cyber security tools

22
Q

What is netcat?

A

A computer networking utility for reading from and writing to network connections using TCP or UDP.