Mod B Flashcards
this type of log monitors computer system events such as when a computer stops or starts and OS events, such as when a service starts or stops
system logs
successful and failed login attempts are most likely to be contained within what type of logs
security
Diffie Hellman and ElGamal key exchange uses what mathematical function
discrete logarithms
RSA uses what mathematical function
prime number factors
Ad hoc mode, also called peer to peer mode, is useful for sharing ___ from one computer to anotherr
files
Only ___ sites support DR testing in accordance with a company’s DRP
hot
In a ___ attack, an attacker sends UDP pakcets with a spoofed source address to a directed broadcast address. Every device that receives one of thse UDP boradcasts will send a response to the spoofed source address
fraggle
___ attacks use malformed IP packets in which the source and destination address and port are the same. When the victim with the destination receives the packet, it can become confused and crash
LAND (local area network denial)
In a ___ attack, an attacker uses serveral large overlapping ip fragments. The victim system will attempt to reassemble these packets, sometimes causing the system to crash
teardrop
What transport protocol was discovered to be vulnerable to POODLE?
SSL
CVSS scoring is influenced by what 3 metric groups?
Base: severity, set by vendor
Temporal: urgency, set by vendor
Environment: how it effects end user of a specific organization, set by end users
password ___ restrictions will ensure that a specified number of time has passed before a user is allowed to manually change a newly changed password
age
What routing protocol does not support MD5 authentication for secure route updates?
RIPv1
___ is an access control principle that ensures information does not flow between groups and users
Compartmentalization
A secure development metric that ranks security issues in order to quantify risk
risk density