• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

Port number for SSH

22

Port number for FTP

21

Port number for Telnet

23

Port number for HTTP

80

Port number for HTTPS

443

Port number for RDP

3389

Port number for SMTP

25

Port number for DNS

53

Port number for DHCP

67 and 68

Port number for Kerberos

88

Port number for POP3

110

Port number for SNMP

161

Port number for LDAP

389

Port number for TFTP

69

What does TFTP stand for and do?

Trivial File Transport Protocol.


No authentication. Transfers router configuration files on a network.

What does LDAP stand for and what does it do?

Light-Weight Directory Access Protocol.


Connects, searches and modifies internet directories.

Which Key Agreement Protocol is used in Public Key Cryptography

ECDH

What is Elliptic Curve Diffie-Hellman (EHDC)

Key Exchange Protocol used in public key cryptography. Establishes a secure session between two parties.

What is Rivest-Shamir-Adleman (RSA)

Most common public-private key generation algorithm.

What is Advanced Encryption Algorithm

Symmetric key cryptography, not used in public key cryptography.

What is the simplest form of disaster recovery

Documentation Review

What is the Recovery Point Objective

RPO is the MAXIMUM allowable amount of DATA that the company can AFFORD to lose during an incident

Does PAP send credentials over clear text?

Yes PAP is not recommended for use. EAP is better

What uses password hashes and challenge methods to authenticate systems

Challenge Handshake Authentication Protocols

Which password authentication protocol is used only by microsoft?

Microsoft-CHAP (MS-CHAP)

What is the best password authentication protocol

EAP

Security Identifier (SID)

Unique number assigned to each windows account

Group and User Identifiers are located on which OS user account

Linux, UNIX

Type of Governance developed internally with policies, procedures and standards

Organizational Governance

Public key cryptography that uses web of trust model

PGP because it uses small groups of individuals

What is used to obtain the status of digital certificates in public keys?

Online Certificate Status Protocol (OCSP)

The length of time a device is expected to last in operation. Single occurrence.

Mean Time to Failure

What is the manufacturers best guess on how much time a device will fail? Multiple failures

Mean Time Between Failures

What is the size of the Initialization Vector for TKIP used in WPA.

48-bit

Do first responders notify the incident response team?

No, they secure the scene, notify management and determine the impact and scope.

What evidence proves innocence

Exculpatory evidence

What evidence proves innocence?

Inculpatory evicence

What kind of evidence is used with charts and other educational items?

Demonstrative evidence

What kind of pen test does neither the testers or the clients know about the test of network

Double-Blind test

Bob needs which key in order to encrypt data sent to Dan

Dan's public key