Term
What were some significant Viruses? |
|
Definition
Melissa Michaelangelo Brain |
|
|
Term
Classifications of Viruses |
|
Definition
Resident Nonresident Boot Sector Macro |
|
|
Term
Potential Characteristic of Viruses |
|
Definition
Program and File Infecting Virus Polymorphic Virus Armored Virus Stealth Virus Multipartite Virus |
|
|
Term
What were some significant Worms? |
|
Definition
Morris Blaster Stuxnet Nimba Mydoom Code Red Love Bug |
|
|
Term
What were some significant Trojan Horses? |
|
Definition
Acid Rain Simpsons Nuker Vundo Mocmex |
|
|
Term
|
Definition
Also known as slag code. Is a virus or Trojan Horse designed to execute malicious actions when a certain event occurs or after a certain period of time. |
|
|
Term
What were some significant botnets? |
|
Definition
|
|
Term
|
Definition
A piece of code between 2 components that is then capable of intercepting calls and even redirecting them elsewhere |
|
|
Term
|
Definition
Identifying ways to make code more efficient through better design. |
|
|
Term
What is URL Hijacking also known as? |
|
Definition
Typo Squatting. This type of attack relies on typographic errors users make on the internet. |
|
|
Term
|
Definition
Attacker sends ping packets to the broadcast address of the network, replacing the original source address in the ping packets with the source address of the victim (Based on the ICMP or Internet Control Message Protocol). |
|
|
Term
|
Definition
The attacker sends spoofed UDP packets to the broadcast address of the network. These UDP packets are directed to port 7 (Echo) or port 19 (Chargen). When connected to port 19, a character generator attack can be run (Based on the UDP packets). |
|
|
Term
2 well-known methods of brute-force attacks. |
|
Definition
Birthday Attack Rainbow Table |
|
|
Term
Name 6 Threat Actor Types? |
|
Definition
Script Kiddies Insiders Hacktivist Nation States/APT Organized crime Competitors |
|
|
Term
What are the 4 Attributes of Actors? |
|
Definition
Internal/External (relationship) Level of Sophistication (capability) Resources/Funding (capability) Intent/Motivation |
|
|
Term
TERM: What does APT stand for? |
|
Definition
Advanced Persistent Threat |
|
|
Term
TERM: What does OSINT stand for? |
|
Definition
|
|
Term
What are some sources of OSINT? |
|
Definition
Television Academic Publications Newspapers Photos Magazines Geospatial Information |
|
|
Term
3 types of penetration testing techniques |
|
Definition
- Black Box (No Knowledge) - White Box (Complete Knowledge) - Gray Box (Limited Knowlege) |
|
|
Term
High-Level Components of Penetration Testing |
|
Definition
- Verify That a Threat Exists - Bypass Security Controls - Actively Test Security Controls - Exploit Vulnerability |
|
|
Term
The 4 Phases of Penetration Testing |
|
Definition
- Planning - Discovery - Attack - Reporting |
|
|
Term
The 4 Progressive Steps During the Attack Phase |
|
Definition
- Initial Exploitation - Escalation of Privilege - Pivoting - Persistence |
|
|
Term
3 Goals of Vulnerability Scans |
|
Definition
- Identify Vulnerabilities - Identify Common misconfigurations - Identify Lack of Security Controls |
|
|
Term
|
Definition
Open Vulnerability Assessment Language |
|
|
Term
|
Definition
Extensible Markup Language |
|
|
Term
2 types of Vulnerability Scans |
|
Definition
- Passive (Non-Intrusive) - Active (Intrusive) |
|
|
Term
|
Definition
An access control practice in which resource availability is restricted to only logins that are explicitly granted access.
deny ip any any. |
|
|
Term
|
Definition
Internet Protocol Security |
|
|
Term
|
Definition
|
|
Term
|
Definition
Encapsulating Security Payload |
|
|
Term
|
Definition
|
|
Term
|
Definition
International Data Encryption Algorithm |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
2 ways in which a VPN operates |
|
Definition
- Full Tunnel - Split Tunnel |
|
|
Term
How does a full tunnel VPN wor? |
|
Definition
All requests are routed and encrypted through the VPN. |
|
|
Term
How does a Split tunnel VPN work? |
|
Definition
Traffic is divided. Internal traffic requests are routed over the VPN; other traffic, such as web and email traffic, directly accesses the Internet. |
|
|
Term
|
Definition
- Network Base - Host Base |
|
|
Term
|
Definition
A typical or expected behavior is identified as irregular or malicious. |
|
|
Term
|
Definition
An alert that should have been generated that did not occur. |
|
|
Term
|
Definition
Interior Gateway Routing Protocol |
|
|
Term
|
Definition
Enhanced Interior Gateway Routing Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Exterior Gateway Protocol |
|
|
Term
|
Definition
Intermediate System to Intermediated System |
|
|
Term
7 layers of the OSI Model |
|
Definition
7 - Application 3 - Network 6 - Presentation 2 - Data Link 5 - Session 1 - Physical 4 - Transport |
|
|
Term
What layer of the OSI Does the Router Work At? |
|
Definition
|
|
Term
What layer f the OSI Does a Switch Work At? |
|
Definition
|
|
Term
Application Layer of OSI Handles? |
|
Definition
End User Layer Http, FTP, IRC, SSH, DNS |
|
|
Term
Presentation Layer of OSI Handles? |
|
Definition
Syntax Layer SSL, SSH, IMAP, FTP, MPEG, JPEG |
|
|
Term
Session Layer of OSI Handles? |
|
Definition
Sync and Send to Port API's, Sockets, WinSock |
|
|
Term
Transport Layer of OSI Handles? |
|
Definition
End-To-End Connections TCP, UDP |
|
|
Term
Network Layer of OSI Handles? |
|
Definition
Packets IP, ICMP, IPSec, IGMP |
|
|
Term
Data Link Layer of OSI Handles? |
|
Definition
Frames Ethernet, PPP, Switch, Bridge |
|
|
Term
Physical Layer of OSI Handles? |
|
Definition
Physical Structure Coax, Fiber, Wireless, Hubs, Repeaters |
|
|
Term
|
Definition
4 - Application 2 - Network 3 - Transport 1 - Network Interface |
|
|
Term
Layer 4 (Application Layer) of TCP/IP Model handle which OSI model layers? |
|
Definition
Layer 5, 6 and 7 (Session, Presentation and Application Layer) |
|
|
Term
Layer 3 (Transport Layer) of TCP/IP Model handle which OSI model layers? |
|
Definition
Layer 4 (Transport Layer) |
|
|
Term
Layer 2 (Network Layer) of TCP/IP Model handle which OSI model layers? |
|
Definition
|
|
Term
Layer 1 (Network Interface) of TCP/IP Model handle which OSI model layers? |
|
Definition
layers 1 and 2 (Physical and Data link) |
|
|
Term
The 3 functions of a switch |
|
Definition
- Filter and Forward Frames - Learn MAC Addresses - Prevent Loops |
|
|
Term
|
Definition
An advanced firewall guard feature used to control network activity associated with DoS attacks and distributed denial-of-service (DDoS) attacks. |
|
|
Term
|
Definition
When 2 different network types need to be accessed |
|
|
Term
What are the 4 types of bridges discussed for the exam? |
|
Definition
- Transparent Bridge - Source Routing Bridge - Transparent Learning Bridge - Transparent Spanning Bridge |
|
|
Term
How does a Transparent Bridge act? |
|
Definition
Similar to a repeater. It only stores traffic until it can move on. |
|
|
Term
How does a Source Routing Bridge act? |
|
Definition
Interprets the Routing Information Field (RIF) in the LAN frame header. |
|
|
Term
How does a Transparent Learning Bridge act? |
|
Definition
Locates the routing location using the source and destination addresses in the routing table. As new destination addresses are found, they are added to the routing table. |
|
|
Term
How does a Transparent Spanning Bridge act? |
|
Definition
Contains a subnet of the full topology for creating a loop-free operation. |
|
|
Term
True or False: Looping problems can occur when a site uses 2 or more bridges in parallel between 2 LANS to increase the reliability of the network. |
|
Definition
|
|
Term
True or False: A bridge loop occurs when data units can travel from a first LAN segment to a second LAN segment through more than 1 path. |
|
Definition
|
|
Term
What technique is used to eliminate bridge loops? |
|
Definition
|
|
Term
How does Network Load Balancing work? |
|
Definition
By distributing the workload among multiple servers while providing a mechanism for server availability by health-checking each server. From the client's point of view, the cluster appears to be a single server. |
|
|
Term
What are the different algorithms used in Network Load Balancing? |
|
Definition
- Round Robin - Random - Least Connections - Weighted Round Robin - Weighted Least Connections |
|
|
Term
True or False? A fat access point is also know as an intelligent or standalone access point. |
|
Definition
|
|
Term
True or False? A thin access point is also known as an intelligent antenna and is managed by a WLAN controller. |
|
Definition
|
|
Term
What are the 3 basic functions of Siems? |
|
Definition
- Centrally manage security events. - Correlate and normalize events for context and alerting - Report on data gathered from various applications. |
|
|
Term
What are 3 backdoor applications? |
|
Definition
- NetBus - Back Orifice - Masters Paradise |
|
|
Term
What is an example of privilege escalation? |
|
Definition
Gaining access to a restricted file by changing the permissions of your valid account. |
|
|
Term
What type of attack affects a database? |
|
Definition
|
|
Term
What are the 4 types of alternate data center facilities? |
|
Definition
- Hot - Redundant - Warm - Cold |
|
|
Term
What are the 2 easiest alternate data center facilities to test? |
|
Definition
|
|
Term
What technologies provide single sign-on authentication? |
|
Definition
- Kerberos - SESAME - Active Directory - Novell eDirectory |
|
|
Term
What are 3 access control models that help companies design their access control structure? |
|
Definition
- DAC (Discretionary Access Control) - MAC (Mandatory Access Control) - RBAC (Role-Based Access Control) |
|
|
Term
What contains LDAP entries? |
|
Definition
They are contained in a DIT (Directory Information Tree), which is a hierarchical structure that can be searched for directory information. |
|
|
Term
What is the start of the LDAP tree called? |
|
Definition
|
|
Term
What port does LDAP work on, and what port would you want to use if you wanted LDAP with SSL (LDAPS) |
|
Definition
|
|
Term
What type of vulnerability is demonstrated with improper input handling? |
|
Definition
|
|
Term
What is the correct order for the evidence life cycle? |
|
Definition
- Collect - Analyze - Store - Present - Return |
|
|
Term
what should you do for disk imaging in an investigation? |
|
Definition
Make a bit-level copy of the disk. |
|
|
Term
What is another name for a surrogate proxy? |
|
Definition
|
|
Term
Where is a transparent proxy placed? |
|
Definition
Between the intranet and internet. |
|
|
Term
What are alternative names for transparent proxies? |
|
Definition
- intercepting proxies - inline proxies - forced proxies |
|
|
Term
|
Definition
A Russian private key encryption standard that uses a 256 bit encryption key. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Secure directory services |
|
Definition
|
|
Term
What protocol uses a dial-up connection that uses a challenge/response mechanism? |
|
Definition
CHAP (Challenge Handshake Authentication Protocol) |
|
|
Term
What is intentionally embedded software code that allows a developer to bypass the regual access and authentication mechanisms? |
|
Definition
Debugging Hooks or Maintenance Hooks |
|
|
Term
|
Definition
Vulnerable code embedded intentionally in software to trap intruders. |
|
|
Term
Describe an Omni Antenna. |
|
Definition
A multi-directional antenna that radiates radio wave power uniformly in all directions in one plane with a radiation pattern shaped like a doughnut. |
|
|
Term
|
Definition
A directional antenna with high gain and a narrow radiation pattern. |
|
|
Term
Describe a Sector Antenna. |
|
Definition
A directional antenna with a circle measure in degrees of arc radiation pattern. |
|
|
Term
Describe a Dipole Antenna. |
|
Definition
The earliest, simplest, and most widely used antenna with a radiation pattern and shaped like a donut. |
|
|
Term
What is secured in a PKI? |
|
Definition
The private key of the root CA |
|
|
Term
What type of monitoring requires updates to be regularly obtained to ensure effectiveness? |
|
Definition
Signature-based monitoring. |
|
|
Term
What type of monitoring is attached to the network in a place where it can monitor all network traffic? |
|
Definition
Network-based monitoring. |
|
|
Term
What type of monitoring detects activities that are unusual? |
|
Definition
Anomaly-based monitoring. |
|
|
Term
What is Behavior-based monitoring? |
|
Definition
Monitoring that looks for behavior that is not allowed and acts accordingly. |
|
|
Term
PaaS (Platform as a Service) |
|
Definition
Allows organizations to deploy Web servers, databases and development tools in a cloud. |
|
|
Term
SaaS (Software as a Service) |
|
Definition
Allows organizations to run applications in a cloud. |
|
|
Term
IaaS (Infrastructure as a Service) |
|
Definition
Allows organizations to deploy virtual machines, servers, and storage in a cloud. |
|
|
Term
Where is a VPN concentrator placed? |
|
Definition
In the perimeter network near the gateway. |
|
|
Term
What is a disadvantage of a hardware-based firewall as opposed to a software-based firewall. |
|
Definition
Hardware firewalls are purchased with a fixed number of interfaces available. |
|
|
Term
What is an advantage of a hardware-based firewall as opposed to a software-based firewall. |
|
Definition
They outperform a software-based firewall and provide increased security. |
|
|
Term
What principle stipulates that multiple changes to a computer system should NOT be made at the same time. |
|
Definition
|
|
Term
The following are rules of change management. |
|
Definition
- Distinguish between your system types. - Document your change process - Develop your changes based on the current configuration. - Always test your changes. - Do NOT make more than 1 change at a time. - Document your fallback plan. - Assign a person who is responsible for change management. - Regularly report on the status of change management. |
|
|
Term
What is the most detrimental type of firewall to network performance? |
|
Definition
application-level proxy firewall. |
|
|
Term
What type of authentication method checks the identity of both ends of the connection? |
|
Definition
|
|
Term
What type of firewall includes 2 network interfaces? |
|
Definition
a dual-homed firewall. One interface connects to the public internet while the other interface connects to the private network. |
|
|
Term
What is another term for a DMZ (demilitarized zone)? |
|
Definition
|
|
Term
What is another name for a Dynamic Password? |
|
Definition
A software-generated password. Which is also an OTP or one-time password. |
|
|
Term
What is a cognitive password based on? |
|
Definition
Personal things of a user such as a mother's maiden name, favorite color, or school, etc... |
|
|
Term
|
Definition
Uses a 40-bit or 104-bit key. |
|
|
Term
|
Definition
Uses a 256-bit pre-shared key |
|
|
Term
|
Definition
Requires a RADIUS server. |
|
|
Term
What type of vulnerability is demonstrated by buffer overflows? |
|
Definition
|
|
Term
What is a captive portal? |
|
Definition
A type of wireless access point that only permits Internet access to authenticated users. |
|
|
Term
What size checksum does MD5 produce |
|
Definition
|
|
Term
What type of secure coding techniques ensure that resources are only allocated when they are needed? |
|
Definition
Provisioning and Deprovisioning |
|
|
Term
What concept term is illustrated by network segmentation, air-gaps, multiple firewalls, and virtualization? |
|
Definition
Defense-in-depth or layered security. |
|
|
Term
|
Definition
Backs up all new files and files that have changed since the last full or incremental backup, and also resets the archive bit. Incremental build on each other. |
|
|
Term
|
Definition
Backs up all new files that files that have changed since the last full backup without resetting the archive bit. Differential backups are not dependent on each other. Take longer to backup then Incremental and Full backups. |
|
|
Term
Important acronym to remember (FRR). |
|
Definition
|
|
Term
Important acronym to remember (CER) |
|
Definition
Crossover Error Rate. Is the point where FAR (False Acceptance Rate), and FRR (False Rejection Rate) are equal. |
|
|
Term
Important acronym to remember (FAR) |
|
Definition
|
|
Term
Important acronym to remember (DIT) |
|
Definition
Directory Information Tree |
|
|
Term
|
Definition
Is a directory service specification on which LDAP is based. |
|
|
Term
At what layer of the OSI do Bridges and Switches operate on? |
|
Definition
Layer 2 though switches can also operate at layer 3. |
|
|
Term
At what layer of the OSI do Hubs and Repeaters operate on? |
|
Definition
|
|
Term
At what layer of the OSI do Routers operate on? |
|
Definition
|
|
Term
What is another name for cross-site request forgery (XSRF)? |
|
Definition
|
|
Term
True or False: Pretty Good Privacy (GPG) is the current de facto email security standard. |
|
Definition
|
|
Term
Mitigation for Cross-site request forgery |
|
Definition
Validate both the client and server side |
|
|
Term
Mitigation for Cross-Site Scripting |
|
Definition
Implement input validation |
|
|
Term
Mitigation for Session Hijacking |
|
Definition
Encrypt communications between 2 parties |
|
|
Term
Mitigation for Malicious add-ons |
|
Definition
Implement application white-listing |
|
|
Term
What is the best protection against cross-site scripting? |
|
Definition
Disable the running of scripts in the browser and Validate all values entered into an application to prevent data input errors and input-validation vulnerabilities. |
|
|
Term
What preserves the existence and integrity of relevant electronic records and paper records when litigation is imminent? |
|
Definition
|
|
Term
What does OAuth or Open Authorization allow? |
|
Definition
Grants and application limited access to a user's account on a third-party site. |
|
|
Term
What does OpenID Connect do? |
|
Definition
provides the authentication necessary in OAuth. It authenticates the user, and stores the user information in a token. |
|
|
Term
What does standard naming convention solve? |
|
Definition
Resolves the issue of obvious account names that could identify a job role. |
|
|
Term
What is a security token? |
|
Definition
A small device that generates time-sensitive passwords. Helps to secure remote authentication attempts to a network. |
|
|
Term
What does the Key Distribution Center (KDC) do during the Kerberos protocol |
|
Definition
The KDC is used to store, distribute, and maintain cryptographic session keys. |
|
|
Term
|
Definition
VPN gateway requires the use of IPSec for all remote clients. The remote clients use IPSec to connect to the VPN gateway. IPSec is not used for any commmunication between the VPN gateway and the internal hosts on behalf of the remote clients. Only the traffic over the Internet uses IPSec. |
|
|
Term
|
Definition
Each host must deploy IPSec. Any internal hosts that communicate with the VPN clients would nned to deploy IPSec. |
|
|
Term
|
Definition
The gateways at each end of the connection provide IPSec functionality. The individual hosts do not. The VPN is transparent to the users. ALSO REFERRED TO AS SITE-TO-SITE. |
|
|
Term
What 2 attacks target virtual machines? |
|
Definition
|
|
Term
What is the checksum of SHA-1? |
|
Definition
|
|
Term
What is the checksum of SHA256 or SHA-2? |
|
Definition
|
|
Term
3 elements provided by the implementation of a digital signature |
|
Definition
- integrity - Authentication - non-repudiation |
|
|
Term
What type of devices transmit data via WiFi or Bluetooth only to a host device and is vulnerable to data intercaption and attack? |
|
Definition
|
|
Term
What are 2 key stretching functions? |
|
Definition
- PBKDF2 (password-based key derivation function 2) - Bcrypt |
|
|
Term
What are 3 technologies that provide single sign-on authentication? |
|
Definition
- Kerberos - SESAME - Active Directory |
|
|
Term
What are 3 access control models? |
|
Definition
- Discretionary Access Control (DAC) - Mandatory Access Control (MAC) - Role-Based Access Contol (RBAC) |
|
|
Term
Description of a Wildcard |
|
Definition
Reduces the certificate management burden by allowing 1 certificate to be used for multiple subdomains. |
|
|
Term
|
Definition
Checks online certificate status in real-time. |
|
|
Term
|
Definition
Messages sent from a user or application to a CA to apply for a digital certificate. |
|
|
Term
|
Definition
Contains a list of certificates that have been issued and subsequently rescinded by a given CA. |
|
|
Term
Where is a embedded firewall placed? |
|
Definition
|
|
Term
|
Definition
is an attack that sends unsolicited messages over a Bluetooth connection. Basically it is spamming a Bluetooth environment. |
|
|
Term
|
Definition
The act of gaining unauthorized access to a device through its Bluetooth connection. Data can be stolen from a disk-encrypted, screen-lock protected smart phone. |
|
|
Term
True or False: Supporting high resiliency, such as using a highly resilient algorithm, would address the issue of data leakage from a side-channel attack. |
|
Definition
|
|
Term
What encryption standard is used in the Clipper Chip? |
|
Definition
Skipjack, which was developed by the US government. Skipjack uses an 80-bit key |
|
|
Term
What solution is used to avoid accepting invalid keys? |
|
Definition
OSSP (online certificate status protocol) |
|
|
Term
PGP (pretty good privacy) uses |
|
Definition
A web of trust to validate public key pairs. |
|
|
Term
A buffer overflow is an example of? |
|
Definition
|
|
Term
Secure coding techniques that ensure that resources are only allocated when they are needed? |
|
Definition
Provisioning and Deprovisioning |
|
|
Term
What memory vulnerability is associated with multithreaded applications |
|
Definition
Race condition - when you have a variable that is accessed by several threads of an application. |
|
|
Term
What acts as a physical barrier that acts as the first line of defense against an intruder? |
|
Definition
|
|
Term
|
Definition
Certificate Authentication |
|
|
Term
|
Definition
|
|
Term
|
Definition
One-Time Password Authentication |
|
|
Term
|
Definition
|
|
Term
What is the correct order in which items should be preserved for forensic analysis |
|
Definition
- Cache - RAM - Running Processes - Hard Drives - Backup Media |
|
|
Term
Who is primarily responsible for determining access control in a discretionary access control (DAC) |
|
Definition
|
|
Term
When you need to enforce several security setting for all of the computers on your Windows Network in as efficient manner as possible. What should you do? |
|
Definition
|
|
Term
PIV (Personal Identity Verification) vs CAC (Common Access Card). |
|
Definition
PIV is for nonmilitary federal employees and contractors
CAC is for military personnel and contractors. |
|
|
Term
What is the best method to avoiding buffer overflows? |
|
Definition
Execute a well-written program. |
|
|
Term
What is the best solution to protecting all traffic on a HTTP/HTTPS server |
|
Definition
implement a Web Application Firewall. |
|
|
Term
What is another term for technical controls? |
|
Definition
|
|
Term
A hacker has used a design flaw in an application to obtain unauthorized access to the application. What type of attack has occurred? |
|
Definition
|
|
Term
What encryption algorithm is based on the Diffie-Hellman key agreement? |
|
Definition
|
|
Term
What type of encryption algorithm is Knapsack? |
|
Definition
|
|
Term
What type of encryption algorithm is ElGamal? |
|
Definition
|
|
Term
What is a TPM (Trusted Platform Module)? |
|
Definition
Is a specialized chip that you install on a computer's motherboard to assist with full disk encryption. |
|
|
Term
What secure coding technique ensures that improper data is not allowed into the executed program? |
|
Definition
|
|
Term
|
Definition
MD5 128 bit checksums SHA 160 bit checksums |
|
|
Term
What is Defense-in-depth also referred to as? |
|
Definition
|
|
Term
What is the purpose of DLP (Data Loss Prevention)? |
|
Definition
monitors data on computers to ensure the data is not deleted or removed. |
|
|
Term
When implementing a security solution for mobile devices, which 2 common use cases are of primary concern? |
|
Definition
- Low power devices - Low latency |
|
|
Term
How many rounds of computation does 3DES (Triple DES) use? |
|
Definition
|
|
Term
What should you incorporate to ensure that memory allocations have corresponding deallocations when dealing with code quality and testing? |
|
Definition
|
|
Term
What cryptographic technique changes multiple output bits when you change a single input bit? |
|
Definition
|
|
Term
|
Definition
Adding additional bits before the text is hashed making it a good countermeasure to protect against a rainbow table attack. |
|
|
Term
What AAA implementation was created to deal with VOIP (Voice over IP)? |
|
Definition
Diameter was created to deal with VOIP and Wireless Services. |
|
|
Term
What is a tabletop exercise? |
|
Definition
A tabletop exercise simulates a disaster and allows you to check the thoroughness of your disaster recovery plan. |
|
|
Term
What is one of the most less intrusive biometric system authorization methods? |
|
Definition
voice print (voice recognition scanner) |
|
|
Term
|
Definition
A protocol that uses a secure channel to connect a server and a client. |
|
|
Term
SSL (Secure Sockets Layer) |
|
Definition
A protocol that secures messages between the Application and Transport layer. |
|
|
Term
SCP (Secure Copy Protocol) |
|
Definition
A protocol that allows files to be copied over a secure connection. |
|
|
Term
ICPM (Internet Control Message Protocol) |
|
Definition
A protocol used to test and report on path information between network devices. |
|
|
Term
Steps in the evidence life cycle |
|
Definition
- Collect - Analyze - Store - Present - Return |
|
|
Term
How does an Iris scanner work? |
|
Definition
It takes a picture of the user's iris and compares the picture with pictures on file. |
|
|
Term
Verifying appropriate access controls, authentication controls, input validation, and proper logging all.... |
|
Definition
identify a lack of security control. |
|
|
Term
What 2 fire suppression methods are recommended for paper, laminates, and wood? |
|
Definition
|
|
Term
A digital signature contains 3 elements? |
|
Definition
- non-repudiation - integrity - authentication |
|
|
Term
What does a message authentication code (MAC) implement? |
|
Definition
|
|
Term
What does a File Integrity check examine? |
|
Definition
Files to see if there have been any changes and logs changes to files. |
|
|
Term
When you need to digitally sign packets that are transmitted on IPSec connection in a VPN, what should be implemented? |
|
Definition
KHMAC (Keyed Hashing for Message Authentication Code) |
|
|