• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Pinning

Security mechanism designed to prevent attackers from impersonating a web site using fraudulent certificates.

Stapling

Alt to (oscp) online certificate status protocol, but if (CA) is compromised allowing the attacker to issue certifications OSCP, will report them as valid.

What is the OID?

Object identifier is a dot separated series of numbers. It’s viewable on the Gen tab of the certificate. Servers public key is also viewable in the certificate on the details tab of the cert.

1.11.111.1.1.1

What is presented to the AAA system for identification?

Username identification. (AAA) authentication, authorization, and accounting

What is SAML?

Security assertion markup language is a single sign on solution used for web based applications.

What does remote authentication dial in user service provide?

RADIUS provides authentication authorization and accounting for some remote access and wireless network solutions.

What is protected extensible authentication protocol?

PEAP is an authentication protocol that encapsulates and encrypts an extensible authentication protocol within a transport layer security tunnel.

What is an extensible authentication protocol?

Authentication protocol used to create a secure encryption key but does not use transport layer security

Which four command lines and why would indicate an attacker is attempting a banner grabbing attack?

Ping- this resolves the host name to an IP address


Netcat, nmap, and telnet can use IP address to grab banner from the system.


Zenmap and zmap- windows based version of nmap

What is a poodle attack?

Padding Oracle on downgraded legacy encryption attack is a man in the middle exploit which takes advantage of internet and security software clients fall back to secure socket layer.