Mod B Flashcards
this type of log monitors computer system events such as when a computer stops or starts and OS events, such as when a service starts or stops
system logs
successful and failed login attempts are most likely to be contained within what type of logs
security
Diffie Hellman and ElGamal key exchange uses what mathematical function
discrete logarithms
RSA uses what mathematical function
prime number factors
Ad hoc mode, also called peer to peer mode, is useful for sharing ___ from one computer to anotherr
files
Only ___ sites support DR testing in accordance with a company’s DRP
hot
In a ___ attack, an attacker sends UDP pakcets with a spoofed source address to a directed broadcast address. Every device that receives one of thse UDP boradcasts will send a response to the spoofed source address
fraggle
___ attacks use malformed IP packets in which the source and destination address and port are the same. When the victim with the destination receives the packet, it can become confused and crash
LAND (local area network denial)
In a ___ attack, an attacker uses serveral large overlapping ip fragments. The victim system will attempt to reassemble these packets, sometimes causing the system to crash
teardrop
What transport protocol was discovered to be vulnerable to POODLE?
SSL
CVSS scoring is influenced by what 3 metric groups?
Base: severity, set by vendor
Temporal: urgency, set by vendor
Environment: how it effects end user of a specific organization, set by end users
password ___ restrictions will ensure that a specified number of time has passed before a user is allowed to manually change a newly changed password
age
What routing protocol does not support MD5 authentication for secure route updates?
RIPv1
___ is an access control principle that ensures information does not flow between groups and users
Compartmentalization
A secure development metric that ranks security issues in order to quantify risk
risk density
When is the archive bit cleared in a backup scheme?
every time a backup is performed
What backup resets the archive bit
full and incremental
What does the archive bit determine?
Which file needs to be backed up
The process of authenticating to a biometric system
throughput
Business practices that a resonable individual would consider appropriate
prudent man rule
Unused space in a cluster is
slack space
smallest unit of accessible space is a
sector
___ evidence is evidence that includes copies or oral descriptions of original documents
secondary
___ evidence can support a fact that was established by other evidence but cannot by itself establish that fact
corroborative