• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back
Cryptography raises CAIN
Confidentiality, Authentication, Integrity, and Non-repudiation
What is the appropriate order for access control?
identification, authentication, and authorization.
There are multiple types of algorithms:
Hashing and encryption
GOST is a Russian private key encryption standard that uses a 256-bit encryption key. Why was it developed?
GOST was developed as a counter to the Data Encryption Standard (DES).
SKIP
Simple Key management protocol for Internet Protocols (SKIP) is a key management and distribution protocol used for secure IP communication, such as Internet Protocol Security (IPSec).
In PKI, who signs certificates?
An issuer
What does a key revocation system accomplish?
key invalidation
IDEA key and block size?
key=128 bits
block=64 bit block
What size checksum does MD5 produce?
128 bit
PKI trust anchor
A trust anchor is a public key that has been verified and is trusted to sign digital certificates.
PKI
PKI is a system for securely sharing public keys.
PKI Issuer
An issuer is a PKI entity that signs certificates provided by a subject.
GOST
256 bit key
Private key/Symmetric key
RC5 and RC6
Block ciphers
RC4 (Rivest code): block or stream cipher?
Stream cipher
What is a Windows 2000 and Windows XP feature that supports file encryption on NTFS hard disk volumes?
Encrypting File System (EFS)
What does authentication provide?
Authentication provides accountability by attempting to determine the identity of each network user and defining that user's level of access to resources.
Level 2 X.509
Verifies a user's name, address, social security number, and other information against a credit bureau database.
What does an X.509 CRL contain?
An X.509 Certificate Revocation List (CRL) contains a list of serial numbers of unexpired or revoked digital certificates that should be considered invalid.
What is Skipjack?
Skipjack is a private key encryption standard that was developed by the U.S. government for the Clipper Chip. Skipjack uses an 80-bit key.
What media access protocol does 802.11 use?
CSMA/CA
To properly dispose magnetic media?
degaussing, reformatting, cutting into pieces
Which private key algorithm does PGP use to encrypt data?
IDEA
What is a passive network attack?
An attack that captures traffic as it passes through a network and does no alterations of the the data or the network.
L2TP port number?
1701
Which type of attack intercepts an established TCP session?
TCP or session hijacking
What allows an administrator to document actions taken on a computer network and the party responsible for those actions?
Audit logs. Administrators can use audit logs to document actions taken on a computer network and the party responsible for those actions.
What is the fault tolerance measure known as disk striping with parity?
RAID 5
Which agents are used by the presence service of an IM system? (Choose two.)
A presence user agent and a watcher user agent are used by the presence service of an Instant Messaging (IM) system.
What do audit trails determine to an administrator?
Accountability. Accountability is often determined using audit trails to ensure that users are not performing unauthorized functions.
What replaced NTLM for network user authentication on a Windows network?
Kerberos replaced NT LAN Manager (NTLM) for network user authentication on Windows 2000 networks.
CHAP handshake step one.
1. The client sends the server a logon request.
CHAP handshake step two.
2. The server sends the client a challenge.
CHAP handshake step three.
3. The client creates a message digest from a hashing algorithm.
CHAP handshake step four.
4. The client sends the server a response.
CHAP handshake step five.
5. The server creates a message digest from a hashing algorithm.
CHAP handshake step six.
6. The server compares the message digest in the response with the one the server has created.
CHAP handshake step seven.
7. The server sends either an authorize or a fail message to the client.
Which virus could infect both executable files and boot sectors of hard disk drives?
A multipart virus can infect both executable files and boot sectors of hard disk drives. The multipart virus resides in the memory and then infects boot sectors and executable files of the computer system.
Virus types:
* Stealth virus: It hides the changes it makes as it replicates.

* Self-garbling virus: It formats its own code to prevent antivirus software from detecting it.

* Polymorphic virus: It can produce multiple operational copies of itself.

* Multipart virus: It can infect system files and boot sectors of a computer system.

* Macro virus: It generally infects the system by attaching itself to MS-Office applications.

* Boot sector virus: It infects the master boot record of the system and is spread via infected floppy disks

* Compression virus: It decompresses itself upon execution but otherwise resides normally in a system.
Which encrypted tunneling protocol protects transmitted traffic and supports the transmission of multiple protocols?
L2TP supports multiple protocols, such as Transmission Control Protocol (TCP), Internet Protocol (IP), Internetwork Packet Exchange (IPX) and Systems Network Architecture (SNA).
L2TP port number?
1701
PPTP port number?
1723
DIT
Directory Information Tree. A hierarchical structure that can be searched for directory information.