SG 5 - Study Notecards Flashcards

1
Q

What is Biometrics?

A

Use of physical characteristics of a user to perform authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is BYOD ?

A

Bring Your Own Device

A policy that allows users to bring in their own devices to use on the corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an instruction pointer?

A

A register that contains the memory address of the next instruction to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hash?

A

A fixed length value that is generated by a hashing algorithm regardless of the length of input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an evil twin?

A

A rogue wireless access point pretending to be a legit access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Public Key Cryptography ?

A

The use of asymmetric keys to encrypt and decrypt messages between parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Buffer Overflow Attack?

A

Sending more data into an application than it exprects with the intention of controlling the flow of execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WPA ?

A

Wi-Fi Protected Access

The current encryption mechanism used for Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bluesnarfing ?

A

Obtaining data from a bluetooth device without authentication or authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Diffie - Hellman ?

A

A mechanism used to have 2 parties mutually derive encryption keys without exposing the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pretexting?

A

The use of a story (the pretext) by an attacker when they make social engineering attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ASLR ?

A

Address Space Layout Randomization

A strategy used to protect against buffer overflow attacks, which usually rely on application using the same address space each time it runs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Web of Trust?

A

The scheme PGP uses, relying on other users to validate the identity of certificate owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Certificate Authority?

A

A trusted 3rd Party used to hand out encryption keys and validate a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is PGP ?

A

Pretty Good Privacy

A means of managing certificates in a distributed way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly