• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

What’s a Clipper chip?

A device used by government agencies to bypass encryption.

Which attack would be viable to obtain 2 different messages that produce same message using same hash function?

Birthday attack

Leakage sources used by side-channel analysis

Power, timing, electromagnetic

Which attack usually analyzed large amounts of plaintext pairs created with the same key?

Linear cryptanalysis

Which attack is less likely to be caught when trying to use the credentials of another user or admin?

Pass the hash

Which of the encryption standards rely on “web of trust”?

PGP

Zeroization

Erasing of electronic data by overwriting the contents with no value so that the data can not be recovered.

The network admin see all nodes on a subnet are experiencing network slowness and also suspects an infected computer on the network. Which tool can be utilized in this situation?

Protocol analyzer

A 802.1 device performs the following

Role based access checking, all assignment, posture checking

Risk with using UDP

Packets may arrive out of order

Packet destined for a devices on a network?

Broadcast

A land attack exemplifies what kind of attack?

DoS

2 common types of coax transmission methods

Broadband and baseband

Will capture all data whether or not it’s intended for your machine

Promiscuous mode

Host exposed to an attack from the internet

Bastion host

What type of firewall delivers highest amount and depth of control?

Application gateway

Crossover rate expressed as

FRR=FAR

Which method of data erasure is used when only special laboratory techniques can recover data?

Clearing

For system hacking, which is the next step after cracking systems account password?

Maintain access

Which information when compromised, could cause serious damage to national security?

Secret

A security manager wants all laptops to include a security crypto processor. The hardware required for this would be?

Trusted platform module (tpm)

A data custodian is a person who is responsible for securing resources after security label is assigned to a resource by?

Data owner

The order in which the physical protection system should work

Deter-Detect-Delay-Response

Physical factors for physical security environment protection factors

Facility construction and location


Security features of facility


Earth movement

The viewing of events after the fact using a CCTV is considered a

Detective control

A structured classification scheme for computer security attack and incident information

Taxonomy

What is the bare minimum twisted pair cat cable for 100MBps?

Cat 5

The access control which allows the ability to take action on a subject

Right

Access control matrix that is called the ACL

Column

Establishes DAC over a file in a directory

Subject

Advantage of discretionary access control technique

Automatic limited access

Preventing an unauthorized user from accessing a file is a function of

Authorization

Administrators dictate who can access and modify data and systems

Mandatory

Access rights assigned to individual subjects

Capabilities

Access rights assigned to objects

Access control lists

All access must be mediated, protected from unauthorized modification and verifiable as correct is implemented through what?

A security kernel

RBAC can implement either

Discretionary access control or mandatory access control

What type of control is a permission?

Logical

Passwords

Something you know