-
What device will tell you if you’re being hit by a bot net?
performance monitor (PM)
-
___ is where an attacker leaves a piece of removable media like a CD ROM, in a place where an unsuspecting user is likely to find it.
Baiting. This attack is sometimes called a road apple
-
What are Nessus and Nmap?
security analyzers for UNIX systems
-
What are MBSA and SCW?
security analyzers for Microsoft
-
What is mutual authentication?
first a service or resource verifies the client’s credentials, then the client verifies the resource’s credentials
-
The “marker” in a message, is an example of ___.
hashing
-
How do you decrypt a hash?
you cannot
-
What is a one-time pad?
an encryption algorithm where a key is used only once
-
What is TPM?
trusted platform module that goes with “bit locker” that generates keys and random numbers. Can be used to encrypt your drive or for digital rights management or to authenticate hardware
-
What is MD5?
a hashing algorithm
-
What is SHA?
secure hash algorithm
-
What is LANMAN?
a hashing algorithm that creates weak passwords
-
What is NTLM?
a hashing algorithm authentication protocol
-
AES and ___ go together.
Reindale
-
Reindale and ___ go together.
AES
-
Elliptic curve algorithm is ___.
asymmetric
-
Another term for a marker inserted into a message is ____.
digital signature
-
What was the first successful algorithm to be designed for public key encryption?
RSA
-
Rijindel is the most popular form of ___.
AES
-
What is PPP?
point-to-point protocol
-
What does PPP (point to point) protocol do?
it enables a work station to communicate to a server using a serial connection. It requires little configuration
-
What does Diffe-Hellman provide you?
secure key exchange
-
What is IDS?
intrusion detection system
-
What is a domain name?
the symbolic name that identifies a domain, like www.everythingforcoffee.com usually associated with a company or other organization
-
HIDS stands for ___.
host-based intrusion detection system
-
DSA stands for ___.
Digital signature algorithm, used only for authentication. Similar to RSA
-
802.11i specifies what kind of encryption?
AES
-
Shared-key encryption is the same as ___.
Symmetric encryption
-
Symmetric encryption is the same as ___.
Shared-key encryption
-
Why might environmental controls be considered to be critical?
if the HVAC system goes out during summertime
-
-
-
-
-
What really is HTTPS?
HTTP over SSL
-
What are the two OSI model layer acronyms?
all people seem to need data processing, and please do not throw stale pizza away
-
DAC and RBAC are very similar, so look for the word ___ in the working of the question.
role
-
Why require a mandatory vacation?
to audit the person on vacation
-
What is PMI?
privilege management infrastructure
-
Does MAC or DAC deal with top secret, secret, etc. levels?
MAC
-
Does MAC or DAC use ACLs?
DAC
-
What does ACL mean?
access control list
-
___ over-rules any other access you may have.
deny
-
List the three authentication factors.
something you know, have and are
-
Kerberos authentication is based on a ___ ticket granting system.
time sensitive
-
What is a DC?
domain controller: a server that responds to security authentication requests
-
What is KBA?
knowledge based authentication, i.e. Your mother’s maiden name
-
What two things are related by the DNS server?
host names and their associated IP addresses
-
Most hosts are named ___.
www
-
A ___ is a computer that enables resource sharing by other computers on the same network.
host
|
|