Security Flashcards

1
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption

A

One key for sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES

A

56 bit key
Used by SNMPv3
Considered weak today
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3DES

A

Three 56bit keys (168 bit)
Encrypt, decrypt, encrypt
Symmeyric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES (Advanced Encryption Standard)

A

Preferred symmetric encryption
Used in WPA2
128, 192 or 256 bit key
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RSA

A

Asymmetric

PKI to exchange key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Encryption

A

2 keys

Public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashing

A

An algorithm that runs a string of data and creates a hash or hash digest
Servers as a unique fingerprint for a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MD5

A

128 bit hash digest

Can have hash collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SHA-1

A

160 bit hash digest

Less collison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA-256

A

256 digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CRAMMD5

A

Commonly used for emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS attack

A

Floods victim server with service requests, cause memory shortage and crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP SYN Flood

A

Variant of DoS. Attacker initiates multiple tcp sessions but never finishes the handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smurf

A

Sends a ping to the broadcast address, devices all reply and takes up bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateful Firewall

A

Inspect traffic as part of sessions

17
Q

Packet-filtering firewall

A

Permit or deny entry based on contents of packet header

18
Q

NGFW

A

Third gen

Deep packet inspection to filter out packets based on the packets entire content

19
Q

ACL

A

List of rules assigned to router/firewall