-
4 parts of PKI
CA, RA, RSA, digital certificate
-
CPS
Certificate Practice Statement
-
What is Retina
Vulnerability Scanner
-
What is Nessus
Vulnerability scanner
-
Black, White, and Grey box testing
Black is no knowledge, white is full knowledge, grey partial
-
-
What is WTLS?
Wireless Transport Layer Security
-
WSP?
Wireless Session Protocol
-
WTP, what does it do?
Wireless Transaction Protocol, provides services similar to TCP and UDP
-
WDP and what does it do?
Wireless Datagram Protocol, provides interface for devices
-
LEAP, PEAP, and which is more secure?
Lightweight/Protected Extensible Authentication protocol, PEAP more secure. LEAP was Cisco, PEAP is RSA/MS/Cisco
-
What can an IV attack get?
WEP key
-
WTLS is part of what protocol stack?
WAP
-
CPS
Certificate Practice Statement
-
CSP
Cryptographic Service Provider
-
OCSP and what used for
Online Certificate Status Protocol, used to see if a digital certificate has been revoked
-
3 types of access
1. know 2. have 3. are
-
Which of the following PKI elements are placed in a browser's trusted root CA?
Public key
-
Label-based management is also called:
Rules-based management
-
Key range size in RC5?
0-2040 bits
-
Does SFTP use TCP, UDP or both?
TCP
-
In the key recovery process, which key must be recoverable?
Previous key
-
How big is a blowfish block cipher, and how many bits can a blowfish key length be?
64 bit cipher, 448 bit key length
-
What is snow.exe used for?
steganography
-
Is RSA a stream or bock cipher?
block
-
Which IDS uses algorithms to analyze traffic?
Heuristic
-
What is Netstumbler used for?
Finding wireless networks
-
What is kismet used for?
Breaking into wireless networks
-
What is Absinthe used for?
SQL injection
-
What is THC scan used for?
War dialing
-
What is the encryption strength of NTLM v2 passwords?
128 bit
-
What is the strength of NTLM v1 passowords?
56 bit
-
WML?
Wireless Markup Language
-
Twofish key block cipher size and max key size
128 bit cipher, up to 256 bit key
-
Which asymmetric encryption algorithm does not authenticate and is susceptible to man in the middle attacks?
Diffie Helman
-
DLP?
Data Loss Prevention
-
Is RC4 block or stream cipher?
Stream
-
Biba Model
No write up, no read down
-
Bella La-Padula Model
No read up, no write down
-
Noninterference model
higher security options can't interfere with lower security
-
Clark-Wilson Model
Data can't be accessed directly
-
Bridge, mesh trust models
Bridge: a p2p network exists between root CAs, intermediate only trusts above and below it.
-
SSH uses which 3 encryption algorithms?
Blowfish, DES, IDEA
-
ASR
Attack surface reduction
-
Q: What is the size of the initialization vector (IV) that WEP uses for encryption?
24 bit
-
Difference between digital certs and sigs
Sigs are hashes used to verify integrity. Certs are bindings of public keys to verify non-repud
-
Q: Which term refers to the ability to manage individual resources in the CA network?
granularity
-
What is known as a message digest?
Hash function
-
By comparing attack signatures and audit trails, a ____ determines whether an attack is occurring
MS-IDS, misuse detection IDS
-
BIA
Business Impact Anaylsis
|
|