50-3b

  1. A (or an) ___ maps MAC addresses with host IP addresses.
    ARP table
  2. What uniquely identifies nodes on a TCP/IP network?
    IP address
  3. What is the bottom-up acronym for the 7 layers?
    people dare not throw salty pretzels away
  4. What is DES?
    data encryption standard
  5. DES requires “what” of both the sender and the receiver?
    that they possess the same secret key
  6. What is the main disadvantage of 3DES?
    it’s three times slower than DES
  7. What is meant by “symmetric”?
    a symmetric encryption scheme is where both parties use the same key for encryption and decryption
  8. What is the main disadvantage to symmetric encryption schemes?
    they don’t scale well when you have a large number of users
  9. What is war driving?
    hackers with wireless laptops connecting to unprotected WLANs to access their resources
  10. What is a smurf attack?
    DoS attack where ping messages are broadcasted to an entire network on behalf of a victim computer, to flood him with responses
  11. What is SNMP?
    simple network management protocol which is vulnerable because it uses clear text. “v1” is much more vulnerable than “v2”. Someone who gains administrative control, can take over network connection devices.
  12. What is stateful packet inspection?
    In SPI, every time a packet is sent out of the computer, the firewall keeps track of it. When a packet comes back to the firewall, the firewall can tell whether the inbound packet is a reply to the packet that was sent out. This way the firewall can handle most network traffic safely without a complex configuration of firewall rules
  13. What is TPM?
    trusted platform module is something that goes with Bit locker
  14. What is VCPU?
    virtual CPU on a server
  15. Where is “virtual supervisor” used?
    in Cisco systems
  16. What is zone transfer used for?
    for security logging on a DNS server
  17. What is NTLMv2?
    a hashing algorithm authentication protocol from Microsoft
  18. What is OVAL?
    Open vulnerability and assessment language. It’s a standard that uses an XML-based language for the storage and dissemination of security information.
  19. What is quantum encryption?
    it involves sending data by way of photons, which are polarized in one of four directions. Eavesdroppers cause detectable changes in orientation which prevents them from getting secret information.
  20. What is RC4W?
    a symmetric algorithm using variable key lengths
  21. What is RSA?
    the first successful algorithm designed for public key encryption
  22. The “sandbox” is used by ___.
    Java
  23. What is SFTP?
    secure FTP, which is a SSH-encrypted version of FTP protocol
  24. What is SHA?
    secure hash algorithm modeled after MD5
  25. What is Hypervisor?
    virtual machine component that monitors and manages the various virtual instances
  26. What is IDS?
    intrusion detection system which scans, audits and monitors the security infrastructure for signs of attacks in progress
  27. What is IETF?
    the internet engineering task force
  28. What’s meant by “implicit deny”?
    blocks everything and only allows explicitly granted permissions
  29. What’s an internet content filter?
    tool used for allowing users to go to approved business-related websites only
  30. What is ISAKMP?
    Internet security association and key management protocol. They define procedures for authenticating computing peers, security associations, key generation techniques, and thread mitigation
  31. Who uses the “Key distribution center”?
    Kerberos
  32. Who uses the “key ring”?
    PGP
  33. What is 10base5?
    cable that uses thicknet coaxial copper
  34. What is AES?
    it is the most recent addition of cryptography
  35. What is Blowfish?
    a free 64-bit block cipher algorithm that uses variable key length
  36. What is DES?
    a weak form of encryption using symmetric keys
  37. What kind of encryption has the smallest keyspace?
    DES
  38. What are GRE packets?
    Generic routing encapsulation point-to-point tunneling protocol to create private networks
  39. What is meant by Gutman sanitization?
    removing data from storage media with reasonable assurance it can’t be retrieved and reconstructed
  40. What is 3DES?
    a symmetric encryption algorithm that processes each block of data three times with a different key each time
  41. What is 80211 modE?
    it has to do with “over the air” modulation techniques
  42. What is 8021x?
    a standard for port-based network access control for devices wishing to connect to a LAN
  43. What is ACL?
    access control list is statements used by a router to permit or deny the forwarding of traffic on a network, based on one or more criteria
  44. What is AES?
    a symmetric block cipher for encryption. Uses private key. Rijndael is the most popular form
  45. What is ARP?
    Address resolution protocol in the network layer. Relates MAC addresses to their IP addresses
  46. What is blue snarfing?
    process where attackers gain access to unauthorized information on a wireless device using a Bluetooth connection
  47. What is a CA?
    certificate authority issuing and maintaining digital certificates as part of the public key infrastructure
  48. What is CHAP?
    Challenge handshake authentication protocol that operates over PPP. It requires the authenticator to take the first step by offering the other computer a challenge
  49. What is a CRL?
    certification revocation list, of certificates that are no longer valid
  50. What is DAC?
    discressionary access control, where access is controlled based on users identity. Objects are configured with a list of users that are allowed to access them
Author
practice361
ID
15568
Card Set
50-3b
Description
Terms
Updated