Practice A Flashcards
to calculate qualitative risk, multiply:
Threat x Vulnerability x Impact
a threat ___ is the party responsible for a threat, and the threat ___ is the potential medium of the attack
agent; vector
a SEIM system is only used when there are multiple ___
servers
processors typically support two states: ___ which has highest privileges, or ___ which is associated with users
Supervisor/kernel; problem
___, aka encapsulation is used in object oriented programming to separate subjects and objects
data hiding
the ___ wireless standard supports 2.4 or 5 GHz and increases throughput up to 600 Mbps by supporting multiple Input/output frequencies
802.11n
a client device responds to a TFTP server using a ___ port, in the number range:
registered, or user; 1024 - 49151
temporary communication sessions are often established using ___ ports, in the number range:
ephemeral, or private; 49152 - 65535
of the fire sensing technologies, only ___ sensors require line of sight
flame
the main concern about Bluetooth on a network is ___
weak encryption
Extensible Access Control Markup Language (XACML), Security Provisioning Markup Language (SPML) and Security Assertion Markup Language (SAML) are all open standards created by ___
OASIS (Organization for the Advancement of Structured Information Standards)
the difference between Network Address Translation (NAT) and Port Address Translation (PAT) is:
PAT assigns multiple private IP’s to one public IP by assigning Port numbers, while NAT assigns one-to-one private to public IP’s
communicating with either IPv4 or IPV6 can be done by a ___ device, by using ___ to translate the traffic, or between LAN’s using ___
dual stack;
Network Address Translation-Protocol Translation (NAT-PT);
4to6 or 6to4 tunneling
while Kerberos does a good job preventing eavesdropping attacks, it is vulnerable to ___
theft of cached credentials which are not encrypted
in network data encapsulation, bits are encapsulated into ___, then into ___, then into ___
frames; packets; segments