• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
What port does DNS use?
53
what port does DHCP use?
67
what port does FTP use?
20/data 21/control
what port does HTTP use?
80
what port does IMAP use
143
what port does LDAP use
389
what port does NNTP use?
119
what port does NTP use?
123
what port does POP3 use?
110
what port does SMTP use?
25
what port does SNMP use?
161
what port does SSH use?
22
what port does telnet use?
23
what port does TFTP use?
69
what port does HTTPS use?
443
what port does NETBIOS Session service use?
139
what are the 4 layers of WAP security?
WSP,WDP,WTLS,WTP
What are the uses for types A,B,C,D fire extinguishers?
A: Wood and paper
B: Flammable liquids
C:Electrical
D: Flammable metals
what is the PASS method of using the fire extinguisher?
Pull,Aim,Squeeze,Sweep
What are the two primary protocols used by IPSec
AH(Authentication Header) and ESP(Encapsulation Security Payload)
The Methodology of a Forensic Investigation
• Acquire the Evidence
• Authenticate the Evidence
• Analyze the Evidence
How does an Armored Virus Work?
designed to make it difficult to detect and analyze, covers itself with protective code to stop debuggers and other software from examining the virus
how does a Companion Virus work?
attaches itself to a legitimate program and then creates a program with a different filename extension, when user opens the other file the virus executes instead of the legit program
How does a Macro Virus work?
exploits vulnerabilities in applications program like MS word or Excell. uses BASIC code used by the programs for certain functions like spellcheck.
How does a Multipartite Virus work?
attacks the system in multiple ways,may infect boot sector, all files and destroy files all at once.
How does a Phage Virus work?
modifies other programs and databases, infects all files, only way to get rid of it is to delete/reinstall every infected program making it difficult to remove.
How does a Polymorphic Virus work?
changes in order to avoid detection,attempts to hide from anti-virus software, may encrypt parts of itself to avoid detection, this process is called a mutation, changing the signature of the virus
How does a Retrovirus work?
attacks or bypasses anti-virus software,may attack the anti-virus and destroy definition files, or the entire program itself.
How does a Stealth Virus work?
hides itself from applications, may attach itself to the boot sector of the hdd to hide itself from anti-virus scanning.
what are the HASHING algorithms?
Message Digest(MD5), Secure Hash Algorith SHA-1
What are the Symmetric Algorithms?
DES and 3DES,AES,Blowfish,IDEA,RC5
What are the Asymmetric Algorithms?
RSA,ECC(Elliptic Curve Cryptosystems, Deiffie-Hellman, DSA
Which is faster MD5 or SHA for a hashing algorithm?
Both are good algorithms for hashing but MD5 is faster than SHA
How many bits does the SHA hash algorithm produce?
160 bit hash value
How many bits does the MD5 hashing algorithm produce
128 bit has value
What encryption method does SSL use to establish communication?
SLL uses PKI in the handshake phase to securly exchange symmetric session keys, when client moves to another website the session is closed
what does PPTP use for authentication?
MSCHAP
what does L2TP use for authentication?
can use TACACS+ or RADIUS
What are the 5 steps to incident response?
Identify the Incident
Investigate the Incident
Repairing the Damage
Documenting and Reporting the Response
Adjusting Procedures
What is the CP (Certificate Policy)
is a set of rules that defines how a certificate may be used.
what is a CPS (Certificate Practice Statement)
describes how the CA plans to manage the certificates it issues.
what is ALE,ARO and SLE
ALE: annual loss expectancy
ARO: annual rate of occurance
SLE: single loss expectancy
what ise the ALE formula?
SLE X ARO = ALE