Review Day Flashcards

1
Q

what are the 3 uses for crypto tools

A

authentication, integrity, confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 ways to hack a database

A

SQL injection and Access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 phases of a virus

A

Dormant

Propogation

Triggering

Execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weak collision avoidance vs strong collision avoidance

A

weak collision: infeasable for attack to computer another message so that h(1) = h(2)

strong collision = infeasable to find any 2 messages h(x1) == h(x2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what viruses mutate as the propogate

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the way to avoid sqli

A

sanitize the input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does a password policy use to weed out a common list of passwords not to use

A

a bloom filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what type of protocol does remote authentication use

A

challenge response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the 4 typical access control techniques

A

MAC

DAC

RBAC

ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are subject and object tied toggether with

A

access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what can be used to prevent a replay attack

A

nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is it possible to sort an encrpyted db

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are 2 examples of a DNS attack

A

Cache poisioning, DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is used to cryptographically sign DNS records

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the DNSSEC chain of trust

A

a verified handshake at every DNS lookup node so nothing will get redirected to a bogus site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly