Card Set Information
What device will tell you if you’re being hit by a bot net?
performance monitor (PM)
___ is where an attacker leaves a piece of removable media like a CD ROM, in a place where an unsuspecting user is likely to find it.
Baiting. This attack is sometimes called a road apple
What are Nessus and Nmap?
security analyzers for UNIX systems
What are MBSA and SCW?
security analyzers for Microsoft
What is mutual authentication?
first a service or resource verifies the client’s credentials, then the client verifies the resource’s credentials
The “marker” in a message, is an example of ___.
How do you decrypt a hash?
What is a one-time pad?
an encryption algorithm where a key is used only once
What is TPM?
trusted platform module that goes with “bit locker” that generates keys and random numbers. Can be used to encrypt your drive or for digital rights management or to authenticate hardware
What is MD5?
a hashing algorithm
What is SHA?
secure hash algorithm
What is LANMAN?
a hashing algorithm that creates weak passwords
What is NTLM?
a hashing algorithm authentication protocol
AES and ___ go together.
Reindale and ___ go together.
Elliptic curve algorithm is ___.
Another term for a marker inserted into a message is ____.
What was the first successful algorithm to be designed for public key encryption?
Rijindel is the most popular form of ___.
What is PPP?
What does PPP (point to point) protocol do?
it enables a work station to communicate to a server using a serial connection. It requires little configuration
What does Diffe-Hellman provide you?
secure key exchange
What is IDS?
intrusion detection system
What is a domain name?
the symbolic name that identifies a domain, like www.everythingforcoffee.com usually associated with a company or other organization
HIDS stands for ___.
host-based intrusion detection system
DSA stands for ___.
Digital signature algorithm, used only for authentication. Similar to RSA
802.11i specifies what kind of encryption?
Shared-key encryption is the same as ___.
Symmetric encryption is the same as ___.
Why might environmental controls be considered to be critical?
if the HVAC system goes out during summertime
What is port 25?
What is port 110?
What is port 443?
What is port 80?
What really is HTTPS?
HTTP over SSL
What are the two OSI model layer acronyms?
all people seem to need data processing, and please do not throw stale pizza away
DAC and RBAC are very similar, so look for the word ___ in the working of the question.
Why require a mandatory vacation?
to audit the person on vacation
What is PMI?
privilege management infrastructure
Does MAC or DAC deal with top secret, secret, etc. levels?
Does MAC or DAC use ACLs?
What does ACL mean?
access control list
___ over-rules any other access you may have.
List the three authentication factors.
something you know, have and are
Kerberos authentication is based on a ___ ticket granting system.
What is a DC?
domain controller: a server that responds to security authentication requests
What is KBA?
knowledge based authentication, i.e. Your mother’s maiden name
What two things are related by the DNS server?
host names and their associated IP addresses
Most hosts are named ___.
A ___ is a computer that enables resource sharing by other computers on the same network.