-
What is STP?
spanning tree protocol
-
What is TLS?
Transport Layer Security
-
What is EFS?
The Encrypting File System (EFS) on Microsoft Windows is a file system filter that provides file system-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer
-
What is EAP?
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. The WPA and WPA2 standard has adopted five EAP types as its official authentication mechanisms
-
What is NAC?
network access control
-
What is TKIP?
temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
-
What is NIST?
National institute of standards technology. They do work in such topics as secret and public key cryptographic techniques
-
What is RBAC?
role based access control, where network objects allow access only to users assigned to specific roles
-
What is TACACS?
terminal access controller access control system is an authentication protocol that accepts login requests and authenticates credentials
-
What is TTP?
trusted third party
-
What is NPS?
network policy server, on Windows Server 2008
-
What is MAC?
media access control. Objects are assigned security labels of different levels, to determine if a particular user is permitted to access the object
-
What is SNMP?
simple network management protocol which is vulnerable because it uses clear text
-
What is blue snarfing?
gaining access to unauthorized information on a wireless device
-
What is SAFER?
secure and fast encryption routine
-
What is SLE?
Single Loss Expectancy
-
Botnets do their command and control through ___.
IRC
-
To determine if specific network traffic is an actual attack, you use ___.
a protocol analyzer
-
Why is malware that uses virtualization difficult to detect?
because it might be running at a more privileged level than the AV software
-
How do you push out additional security hot fixes?
patch management
-
How many authentication factors are in a physical token, PIN, and password?
2
-
Does a CRL contain public or private keys?
both
-
What’s the most important consideration when executing a disaster recovery plan?
safety and welfare of personnel
-
What should you check besides account reports, when doing a user account review?
employment verification
-
What’s the best way to get insight into the websites employees are visiting?
proxy server
-
How can you determine which services are running on a server, without logging on to the machine?
use a port scanner
-
What kind of documentation describes how tasks or job functions should be conducted?
procedures
-
Name a secure wireless transmission algorithm.
TKIP-- temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
-
To avoid the overhead of using a VPN, just use ___ instead
SSL
-
Does the ‘hypervisor’ or the “virtual supervisor” manage virtual instances on a virtual machine?
hypervisor
-
What does Kerberos use to issue tickets: A “ticket granting system” or a “key distribution center”?
key distribution center
-
What is susceptible to “frequency analysis”, if used incorrectly?
transposition ciphers
-
Restricting access to files based on the identity of the user or group, is an example of ___.
DAC
-
The critical piece of encrypted communication that must be kept secret is ___.
the salt value
-
When using PKI, you use ___ to encrypt your signature.
private key
-
Another name for a photograph on a computer is a ___.
picture
-
You get pop ups saying you have a virus, and offering a program to remove it. This is an example of ___.
adware
-
To minimize collusion among staff, use ___.
job rotation
-
What is a “false rejection”?
where a biometric system identifies legitimate users as being unauthorized
-
A security audit of group policy can show you ___.
that unnecessary services are blocked on workstations
-
The difference between a worm and a virus is ___.
the virus spreads from file to file by attaching itself. A worm does not attach itself to another file
-
Why is an ATM card better than a photo ID for logging onto a computer?
because an ATM card is machine readable
-
A ___ attack requires you to sniff the network
man in the middle
-
What is MAC flooding?
a technique to compromise the integrity of network switches
-
What is a downside of virtualization technology?
if there’s an attack, it could disrupt multiple servers
-
What is virtualization?
allowing multiple OS’s to run on one computer simultaneously
-
What is it about RAID that increases availability?
mirroring
-
What could someone use, to capture HTTP requests and send back a spoofed page?
TCP/IP hijacking
-
Providing a restricted environment for executing code is a security trait of ___.
a virtual machine
-
Where are IPSec connection parameters stored?
in the security association database
|
|