The Encrypting File System (EFS) on Microsoft Windows is a file system filter that provides file system-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer
What is EAP?
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. The WPA and WPA2 standard has adopted five EAP types as its official authentication mechanisms
What is NAC?
network access control
What is TKIP?
temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
What is NIST?
National institute of standards technology. They do work in such topics as secret and public key cryptographic techniques
What is RBAC?
role based access control, where network objects allow access only to users assigned to specific roles
What is TACACS?
terminal access controller access control system is an authentication protocol that accepts login requests and authenticates credentials
What is TTP?
trusted third party
What is NPS?
network policy server, on Windows Server 2008
What is MAC?
media access control. Objects are assigned security labels of different levels, to determine if a particular user is permitted to access the object
What is SNMP?
simple network management protocol which is vulnerable because it uses clear text
What is blue snarfing?
gaining access to unauthorized information on a wireless device
What is SAFER?
secure and fast encryption routine
What is SLE?
Single Loss Expectancy
Botnets do their command and control through ___.
To determine if specific network traffic is an actual attack, you use ___.
a protocol analyzer
Why is malware that uses virtualization difficult to detect?
because it might be running at a more privileged level than the AV software
How do you push out additional security hot fixes?
How many authentication factors are in a physical token, PIN, and password?
Does a CRL contain public or private keys?
What’s the most important consideration when executing a disaster recovery plan?
safety and welfare of personnel
What should you check besides account reports, when doing a user account review?
What’s the best way to get insight into the websites employees are visiting?
How can you determine which services are running on a server, without logging on to the machine?
use a port scanner
What kind of documentation describes how tasks or job functions should be conducted?
Name a secure wireless transmission algorithm.
TKIP-- temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
To avoid the overhead of using a VPN, just use ___ instead
Does the ‘hypervisor’ or the “virtual supervisor” manage virtual instances on a virtual machine?
What does Kerberos use to issue tickets: A “ticket granting system” or a “key distribution center”?
key distribution center
What is susceptible to “frequency analysis”, if used incorrectly?
Restricting access to files based on the identity of the user or group, is an example of ___.
The critical piece of encrypted communication that must be kept secret is ___.
the salt value
When using PKI, you use ___ to encrypt your signature.
Another name for a photograph on a computer is a ___.
You get pop ups saying you have a virus, and offering a program to remove it. This is an example of ___.
To minimize collusion among staff, use ___.
What is a “false rejection”?
where a biometric system identifies legitimate users as being unauthorized
A security audit of group policy can show you ___.
that unnecessary services are blocked on workstations
The difference between a worm and a virus is ___.
the virus spreads from file to file by attaching itself. A worm does not attach itself to another file
Why is an ATM card better than a photo ID for logging onto a computer?
because an ATM card is machine readable
A ___ attack requires you to sniff the network
man in the middle
What is MAC flooding?
a technique to compromise the integrity of network switches
What is a downside of virtualization technology?
if there’s an attack, it could disrupt multiple servers
What is virtualization?
allowing multiple OS’s to run on one computer simultaneously
What is it about RAID that increases availability?
What could someone use, to capture HTTP requests and send back a spoofed page?
Providing a restricted environment for executing code is a security trait of ___.