50-3a

Card Set Information

Author:
practice361
ID:
15567
Filename:
50-3a
Updated:
2010-04-21 17:57:47
Tags:
Terms
Folders:

Description:
Terms
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user practice361 on FreezingBlue Flashcards. What would you like to do?


  1. What device will tell you if you’re being hit by a bot net?
    performance monitor (PM)
  2. ___ is where an attacker leaves a piece of removable media like a CD ROM, in a place where an unsuspecting user is likely to find it.
    Baiting. This attack is sometimes called a road apple
  3. What are Nessus and Nmap?
    security analyzers for UNIX systems
  4. What are MBSA and SCW?
    security analyzers for Microsoft
  5. What is mutual authentication?
    first a service or resource verifies the client’s credentials, then the client verifies the resource’s credentials
  6. The “marker” in a message, is an example of ___.
    hashing
  7. How do you decrypt a hash?
    you cannot
  8. What is a one-time pad?
    an encryption algorithm where a key is used only once
  9. What is TPM?
    trusted platform module that goes with “bit locker” that generates keys and random numbers. Can be used to encrypt your drive or for digital rights management or to authenticate hardware
  10. What is MD5?
    a hashing algorithm
  11. What is SHA?
    secure hash algorithm
  12. What is LANMAN?
    a hashing algorithm that creates weak passwords
  13. What is NTLM?
    a hashing algorithm authentication protocol
  14. AES and ___ go together.
    Reindale
  15. Reindale and ___ go together.
    AES
  16. Elliptic curve algorithm is ___.
    asymmetric
  17. Another term for a marker inserted into a message is ____.
    digital signature
  18. What was the first successful algorithm to be designed for public key encryption?
    RSA
  19. Rijindel is the most popular form of ___.
    AES
  20. What is PPP?
    point-to-point protocol
  21. What does PPP (point to point) protocol do?
    it enables a work station to communicate to a server using a serial connection. It requires little configuration
  22. What does Diffe-Hellman provide you?
    secure key exchange
  23. What is IDS?
    intrusion detection system
  24. What is a domain name?
    the symbolic name that identifies a domain, like www.everythingforcoffee.com usually associated with a company or other organization
  25. HIDS stands for ___.
    host-based intrusion detection system
  26. DSA stands for ___.
    Digital signature algorithm, used only for authentication. Similar to RSA
  27. 802.11i specifies what kind of encryption?
    AES
  28. Shared-key encryption is the same as ___.
    Symmetric encryption
  29. Symmetric encryption is the same as ___.
    Shared-key encryption
  30. Why might environmental controls be considered to be critical?
    if the HVAC system goes out during summertime
  31. What is port 25?
    SMTP
  32. What is port 110?
    POP3
  33. What is port 443?
    HTTPS
  34. What is port 80?
    HTTP
  35. What really is HTTPS?
    HTTP over SSL
  36. What are the two OSI model layer acronyms?
    all people seem to need data processing, and please do not throw stale pizza away
  37. DAC and RBAC are very similar, so look for the word ___ in the working of the question.
    role
  38. Why require a mandatory vacation?
    to audit the person on vacation
  39. What is PMI?
    privilege management infrastructure
  40. Does MAC or DAC deal with top secret, secret, etc. levels?
    MAC
  41. Does MAC or DAC use ACLs?
    DAC
  42. What does ACL mean?
    access control list
  43. ___ over-rules any other access you may have.
    deny
  44. List the three authentication factors.
    something you know, have and are
  45. Kerberos authentication is based on a ___ ticket granting system.
    time sensitive
  46. What is a DC?
    domain controller: a server that responds to security authentication requests
  47. What is KBA?
    knowledge based authentication, i.e. Your mother’s maiden name
  48. What two things are related by the DNS server?
    host names and their associated IP addresses
  49. Most hosts are named ___.
    www
  50. A ___ is a computer that enables resource sharing by other computers on the same network.
    host

What would you like to do?

Home > Flashcards > Print Preview