• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
What type of key does WEP use?
A 40-bit shared secret key, a RC4 psuedorandom number generator PRNG encryption and a 24 bit initialization vector
What are some liabilities of PDAs
They do not support DAC
They lack audit capabilities
They don't support a non-object reuse policy
They provide no data integrity protection
What do string signatures look for?
text strings that indicate a possible attack
What do header condition signatures look for?
dangerous or illogical combinations in packet headers.
What is logon abuse?
Privilege escalation
What is C2MYAZZ?
A utility that enables server spoofing to implement a session hijacking or MITM attack
During Discovery scanning what does the classification process produce?
Applications running on the target system
During discovery scanning what does the inventory scan produce
A list about the target systems OS and available ports
What is the most basic and fastest type of TCP scan?
TCP connect()
What is a SYN/ACK scan
A scanner sends a SYN/ACK packet if the port is closed it assumes the SYN/ACK is a mistake and sends a RST if the port is open the SYN/ACK will be dropped
What is a liability of TCP FIN scans?
They work only on Non-Windows machines because Windows Machines send a RST regardless of if the port is open or closed.
What are four differences in OS implementation of the TCP/IP stack?
Time to Live
Initial Window Size
Don't Fragment bit
Type of Service
What is the standard TTL value for most network devices, UNIX and Mac systems?
255
What is the standard TTL value for most Windows systems?
128
What is the standard TTL value for HP Jet direct printers?
60
What is the standard TTL value for Windows 95B/98 systems?
32
Port 118
sqlserv
Port 119
nntp
Port 161
snmp
Port 194
irc
Port 389,636
LDAP/Secure LDAP
Port 2049
NFS
Port 5631
PCAnywhere
What are the three main components of a polymorphic virus?
A scrambled virus body, a decryption routine, and a mutation engine
Name common Trojans:
Trinoo, Back Orifice, NetBus, SubSeven
Describe XOR
Performs binary bit addition where T is 1 if A and B are not equal
What is C2MYAZZ?
A utility that enables server spoofing to implement a s ession hijacking or MITM exploit
What is the intent of a discovery scan?
to collect enough information about each network device to identify what type of device it is.
What is the intent of an inventory scan?
It provides information about the target system's OS and its available ports
What is clustering with reguards to cryptography?
a situation in which a plaintext message generates identical ciphertext messages by using the same transformation algorithms but with different cryptovariables or keys
How does link encyrption operate?
each entity has keys in common with its two neighboring entities thus as a node recives the encyrpted message from its predecessor (neighboring node) it decrypts it and then reencrypts it with the shared key for the succesive node.
How is a one-time pad usually implemented
as a stream cipher by using XOR
What is the best known symmetric key system?
DES
Describe DES/DEA
64-bit block size and 56-bit key. It is a 16 round cryptosystem utlizsing S-boxes
How is diffusion performed in DES
P-Boxes
What are the four modes of DES
Cipher block chaining
Electronic Code Book
Cipher Feedback
Output Feedback
How is confusion performed in DES?
S-box
What is the native mode of DES
Electronic Code Book
Which modes of DES operates as a stream cipher?
Cipher Feedback and Output Feedback
Which operational mode of DES is most likely to allow errors to propogate?
Cipher Feedback
In a triple DES encryption notation noted DES-EDE2 what do the letters after DES stand for?
Encrypt
Decrypt
Encrypt
2(keys)
What cipher is AES based on?
Rijndael
What are the bit strenghts of AES variations?
128, 192 and 256
Describe the Rijndael block cipher
iterated block cipher with variable block lenght and variabe key length
What is the fixed block size for AES?
128 bits
What are the three layers of the Rijndael cipher?
The non-linear layer
The liner mixing layer
The key addition layer
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 256 how many rounds will occur
14
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 192 how many rounds will occur
12
The number of rounds in the Rijndael Cipher is a function of the key size: Given a key size of 128 how many rounds will occur
10