Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
What port does DNS use?
|
53
|
|
what port does DHCP use?
|
67
|
|
what port does FTP use?
|
20/data 21/control
|
|
what port does HTTP use?
|
80
|
|
what port does IMAP use
|
143
|
|
what port does LDAP use
|
389
|
|
what port does NNTP use?
|
119
|
|
what port does NTP use?
|
123
|
|
what port does POP3 use?
|
110
|
|
what port does SMTP use?
|
25
|
|
what port does SNMP use?
|
161
|
|
what port does SSH use?
|
22
|
|
what port does telnet use?
|
23
|
|
what port does TFTP use?
|
69
|
|
what port does HTTPS use?
|
443
|
|
what port does NETBIOS Session service use?
|
139
|
|
what are the 4 layers of WAP security?
|
WSP,WDP,WTLS,WTP
|
|
What are the uses for types A,B,C,D fire extinguishers?
|
A: Wood and paper
B: Flammable liquids C:Electrical D: Flammable metals |
|
what is the PASS method of using the fire extinguisher?
|
Pull,Aim,Squeeze,Sweep
|
|
What are the two primary protocols used by IPSec
|
AH(Authentication Header) and ESP(Encapsulation Security Payload)
|
|
The Methodology of a Forensic Investigation
|
• Acquire the Evidence
• Authenticate the Evidence • Analyze the Evidence |
|
How does an Armored Virus Work?
|
designed to make it difficult to detect and analyze, covers itself with protective code to stop debuggers and other software from examining the virus
|
|
how does a Companion Virus work?
|
attaches itself to a legitimate program and then creates a program with a different filename extension, when user opens the other file the virus executes instead of the legit program
|
|
How does a Macro Virus work?
|
exploits vulnerabilities in applications program like MS word or Excell. uses BASIC code used by the programs for certain functions like spellcheck.
|
|
How does a Multipartite Virus work?
|
attacks the system in multiple ways,may infect boot sector, all files and destroy files all at once.
|
|
How does a Phage Virus work?
|
modifies other programs and databases, infects all files, only way to get rid of it is to delete/reinstall every infected program making it difficult to remove.
|
|
How does a Polymorphic Virus work?
|
changes in order to avoid detection,attempts to hide from anti-virus software, may encrypt parts of itself to avoid detection, this process is called a mutation, changing the signature of the virus
|
|
How does a Retrovirus work?
|
attacks or bypasses anti-virus software,may attack the anti-virus and destroy definition files, or the entire program itself.
|
|
How does a Stealth Virus work?
|
hides itself from applications, may attach itself to the boot sector of the hdd to hide itself from anti-virus scanning.
|
|
what are the HASHING algorithms?
|
Message Digest(MD5), Secure Hash Algorith SHA-1
|
|
What are the Symmetric Algorithms?
|
DES and 3DES,AES,Blowfish,IDEA,RC5
|
|
What are the Asymmetric Algorithms?
|
RSA,ECC(Elliptic Curve Cryptosystems, Deiffie-Hellman, DSA
|
|
Which is faster MD5 or SHA for a hashing algorithm?
|
Both are good algorithms for hashing but MD5 is faster than SHA
|
|
How many bits does the SHA hash algorithm produce?
|
160 bit hash value
|
|
How many bits does the MD5 hashing algorithm produce
|
128 bit has value
|
|
What encryption method does SSL use to establish communication?
|
SLL uses PKI in the handshake phase to securly exchange symmetric session keys, when client moves to another website the session is closed
|
|
what does PPTP use for authentication?
|
MSCHAP
|
|
what does L2TP use for authentication?
|
can use TACACS+ or RADIUS
|
|
What are the 5 steps to incident response?
|
Identify the Incident
Investigate the Incident Repairing the Damage Documenting and Reporting the Response Adjusting Procedures |
|
What is the CP (Certificate Policy)
|
is a set of rules that defines how a certificate may be used.
|
|
what is a CPS (Certificate Practice Statement)
|
describes how the CA plans to manage the certificates it issues.
|
|
what is ALE,ARO and SLE
|
ALE: annual loss expectancy
ARO: annual rate of occurance SLE: single loss expectancy |
|
what ise the ALE formula?
|
SLE X ARO = ALE
|