Test Prep Flashcards
MOU
Memorandum of understanding - preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange
Rules of engagement
define how that testing is to occur.
CRLF Injection
software application coding vulnerability that occurs when an attacker injects a CRLF character sequence where it is not expected
MOA
CSRF
malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts
Full Disk Encryption
Data Masking
LDAP
Lightweight directory access protocol: uses a client-server model for mutual authentication.
Directory Traversal
allows attackers to access restricted directories and execute commands outside the web server’s root directory
NTLM
Creates a 128-bit fixed output
RIPEMD
160-bit, 256-bit, or
320-bit message digest
Air Gaps
designed to remove connections between two networks to create physical segmentation between them.
Symmetric encryption
Private key : encryption algorithm in which both the sender and the receiver must
know the same secret using a privately-held key, 1 key
example: DES, IDEA, AES, RC4, RC5, Blowfish
Asymmetric encryption
Public key: Encryption algorithm where different keys are used to encrypt and
decrypt the data, 2 keys are needed.
Example: Diffie-Hellman, RSA, ECC
Stream cipher
Utilizes a keystream generator to encrypt data bit by bit using a
mathematical XOR function to create the ciphertext
Block Cipher
Breaks the input into fixed-length blocks of data and performs the
encryption on each block
DES
Data encryption standard: Encryption algorithm which breaks the input into 64-bit blocks and uses
transposition and substitution to create ciphertext using an effective key
strength of only 56-bits
3DES
Triple DES: uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext
IDEA
International Data Encryption Algorithm: Symmetric block cipher which uses 64-bit blocks to encrypt plaintext into
ciphertext
AES
Advanced encryption standard: uses 128-bit, 192-bit, or 256-bit blocks and a
matching encryption key size to encrypt plaintext into ciphertext
Blowfish
uses 64-bit blocks and a variable length
encryption key
Twofish
uses 128-bit blocks
and a 128-bit, 192-bit, or 256-bit encryption key
RC4
Rivest Cipher: 40-bits to 2048-
bits that is used in SSL and WEP, this is the only stream cipher on the exam
Diffie-Hellman
Diffie-Hellman is used for the establishment of a VPN tunnel using IPSec
RSA
RSA is widely used for key exchange, encryption, and digital signatures RSA can use key sizes of 1024-bits to 4096-bits
One-time pad
A stream cipher that encrypts plaintext information with a secret random
key that is the same length as the plaintext input
Steganography
The science and art of hiding messages within other messages
Ephemeral
A cryptographic key that is generated for each execution of a key
establishment process
Homomorphic Encryption
An encryption method that allows calculations to be performed on data
without decrypting it first
MD5
Algorithm that creates a fixed-length 128-bit hash value unique to the
input file
SHA-1
creates a fixed-length 160-bit hash value
SHA-2
SHA-224, SHA-256, SHA-348, and
SHA512
SHA-3
creates hash digests between 224-bits and 512-bits
Pass the Hash
allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password, Mimikatz tool helps to automate the harvesting of hashes
PKI
Public key infrastructure: n entire system of hardware, software, policies, procedures, and people
that is based on asymmetric encryption
Wildcard certificates
Public key certificate that can be used with multiple subdomains of a domain.
BER
Basic encoding rules: original ruleset governing the encoding of data structures for
certificates where several different encoding types can be utilized