Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
SSID stands for? |
Service Set Identifier |
|
TFTP stands for? |
Trivial File Transfer Protocol |
|
What encryption system superceded DES? |
AES |
|
What does NAT do? |
Allows private IP addresses to be used on a public network |
|
What is the description of social engineering? |
Manipulating someone into giving you access or revealing information |
|
What does ACL stand for? |
Access Control List |
|
What are the three main types of wireless security? |
WPA, WPA2, WEP |
|
IPSec is a type of.... |
Tunneling protocol |
|
A _______ is set off when certain conditions are met |
Logic Bomb |
|
For best security where would you place the email server? |
DMZ/perimiter network |
|
Setting a standardised baseline of security for all your servers is known as? |
Server hardening |
|
Name 2 major disadvantages of WEP |
1. performance is degraded by 30% 2. WEP uses a 10bit character key to encrypt the network |
|
What is the benefit of Microsoft providing updates for their Operating Systems and applications? |
It closes security vulnerabilities |
|
What does CIA stand for? |
Confidentiality Integrity Availability |
|
What are the four steps of hacking? |
Foot printing, Scanning, Enumeration, Exploitation |
|
What is a Honeypot? |
A honeypot is a system that is designed to look weak or like too good of an opportunity to miss to see attack patterns and/or trap hackers. Usually have minimal security and is located on the perimiter network. |
|
Laptops are more suceptible to ______ than desktops |
Theft |
|
What does VPN stand for? |
Virtual Private Network |
|
What is the first thing you do when performing a security audit? |
Check the companies technology assets |
|
Encrypting a file..... |
Scrambles plain text into something unreadable so when it is intercepted it cannot be read |
|
RADIUS stands for? |
Remote Authentication Dial-In User Service |
|
HTTPS works with HTTP an _______ to provide encrypted communication |
SSL(secure socket layer)/TLS(transport layer security) |
|
What is the strongest form of security for wireless networks? |
WPA Enterprise |
|
Kerberos protects against _______ |
Eavesdropping and reply attacks |