Weaknesses 3-20 Flashcards
What is the appropriate default level for an access control mechanism?
No access
The Vigenere cipher was developed in 16th century France. What does it use as a key?
A secret word
How are FDDI and FDDI-2 different?
FDDI-2 allows for fixed bandwidth to be assigned
SSL requires what kind of infrastructure for certificate authorities and certificates?
PKI - Public Key Infrastructure
In 1976 Diffie and Hellman introduced what cryptography technology?
Electronic Key Distribution - Diffie-Hellmen key exchange
What three types of attacks fall under the umbrella of timing attacks?
Between the lines, NAK, and line disconnect
TRUE/FALSE - SYN attack is considered a timing attack
FALSE
Allowing one object to have two security classifications requires what?
Polyinstantiation
TRUE / FALSE - PPTP can only work over IP
TRUE
What is the first step in an audit?
Determine goals
During what step of the penetration testing process do you perform port scans and identify resources?
Enumeration
TRUE/FALSE - TPM uses two types of internal memory for specific purposes. Persistent memory, which is static and contains the endorsement key / storage key — and Versatile memory, which is dynamic and contains attestation key, platform configuration hashes, and storage keys
TRUE
What are the six phases of a project?
Initiate project, perform BIA, create strategy, create plan, implement, test, maintain
What is the difference between 802.11a and 802.11b?
802.11a works in 5GHz range and provides faster data transfer speed than 802.11b
If a company has high turnover rate, which access control structure is best?
Role base