review Flashcards

1
Q

What is cryptography?

A

The study of obsfucation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is DES?

A

DES - Data Encryption Standard is a 56 bit symmetrical key algorithm. Relatively insecure due to short 56 bit key length. Used in WEP largely replaced by more secure AES encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS vs IPS

A

IDS lets you know when something happens

IPS can prevent threats from happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was one of the first web encryptions?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when did SSL come out?

A

1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you want a virus to run in the background where would you put it?

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do routers fragment packets ipv4? ipv6?

A

ipv4 yes, ipv6 no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

whats the difference between ping and traceroute

A

Ping checks a connection, traceroute tracks all hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where are buffers located?

A

Data sections, heaps, or stacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how many bytes is a traceroute packet?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of barcode is on your CAC? front and back

A

front: PDF14
Back: code 39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is data sanitation?

A

SQL injection protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan v spyware v worm

A

trojan: cloak and dagger
spyware: sends info to an outside
worm: self replication, no interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a single point firewall?

A

a funnel for all traffic located outside of the router separating your router and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

know your routing header

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what protocol is used to find near by networks?

A

Neighbor discovery protocol (IPv6)

17
Q

How many bytes make up shell code?

A

25

18
Q

Where is the first place your computer looks for a DNS query?

A

Cache

19
Q

What does a hybrid firewall do?

A

Multiple firewalls with different functions, that way every part of the network is examined

20
Q

types of IDS

A

HIDS - Host-Based Intrusion Detection System
PIDS - Perimeter Intrusion Detection System
VMIDS - Virtual Machine Based Intrusion Detection System
NIDS - Network Intrusion Detection System

21
Q

whats the difference between telnet and ssh?

A

telnet is plaintext, ssh is encrypted

22
Q

Whats the default amount of packets sent on a ping?

A

4

23
Q

where would an IDS be located?

A

behind the firewall

24
Q

When youre able to give yourself privileges on a system -

A

broken authentication

25
Q

what is dynamic packet filtering?

A

considers the contents of the packet as it comes through

26
Q

is dynamic packet filtering stateful or stateless?

A

stateful

27
Q

3 types of DNS queries?

A

recursive, non recursive, iterative

28
Q

What DNS query travels upstream?

A

recursive

29
Q

what is stateless packet filtering?

A

based off destination and source, doesnt care about contents

30
Q

In netscan, what is -T0 vs -T5?

A

-T0 is harder to see but takes longer, -T5 is fastest but easier for the host to detect.

31
Q

what is the GA law for computer trespassing?

A

OCGA 16-9 93b

32
Q

IPv6 multicast address

A

ff00::/8

33
Q

what is the belt and suspenders architecture?

A

two firewalls, one after the router, and one after your public facing servers