Review Flashcards
MD5 Hash
128 Bit
Cryptography
Making something obscure
DES
Symmetric block-cipher
IDS vs IPS
IDS Alerts IPS Changes
IPS Can detect threats
Encryption Node for Websites
SSL came out for websites
To get a virus to run constantly where are you going to place it
In memory
IPV4 can fragment IPV6 does not
True
Ping detects connectivity
Traceroute
517 ID
When someone clears a security log
Where is the buffer located
Data Section, Stack, Heap
Traceroute packet size?
32 bits
Barcodes on CAC Card
PDF14 Front
Code 39 Back
in an IOS what keeps apps from accessing other apps
Data Vault
What is installed in the background and very hard to detect
Rootkit
Data Sanitation
Protect against SQL Injection
Trojan vs Spyware Vs Worm Difference
Know these
When a program is running where is it pulling its data from
The Stack
What is a single point firewall
Its on the outside and its a funnel for all traffic
Routing Header Breakdown
Bits in Each Section
What protocol is used to find Neighbors in IPv6
Neighbor Discovery Protocol
How many bytes make up a shell code
25 bytes
For DNS where is the first place your computer looks
Cache Memory
Hybrid Firewall Do?
Multiple firewalls all assigned to a specific task
Different IDS
HIDS, PIDS, NIDS, VMIS
HIDS, Hueristic Firewall
Functions off of flags
Telnet vs SSH
Unsecure vs Clear
Ping Default runs
4 times
IDS where is it going ?
Behind the Firewall
If you’re able to give yourself privileges what is that called?
Broken Authentication
Dynamic Packet Filtering
Looks at the content of packet and is “stateful”
Different types of DNS Queries
Iterative (Not Upstream), Recursive, Non-Recursive
Stateless Packet Filtering
Just cares about Source and Destination Addresses
Netscan
T0 harder to detect because of the slow speeds vs T5
GA Law that protects against trespassing of computers or hacking
OCGA 16-9-93b
NOPSLED?
What is it
SNORT rules
DROP, REJECT, ALERT, LOG, PASS, ACTIVATE
IPV6 Multicast Address
FF00::/8
Belt and Suspender Firewall Archetecture
Internet - Router - Firewall- Servers - Firewall - Network
Asymmetric and Symmetric Keys Usage
Public and Private Keys