• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

SSID stands for?

Service Set Identifier

TFTP stands for?

Trivial File Transfer Protocol

What encryption system superceded DES?

AES

What does NAT do?

Allows private IP addresses to be used on a public network

What is the description of social engineering?

Manipulating someone into giving you access or revealing information

What does ACL stand for?

Access Control List

What are the three main types of wireless security?

WPA, WPA2, WEP

IPSec is a type of....

Tunneling protocol

A _______ is set off when certain conditions are met

Logic Bomb

For best security where would you place the email server?

DMZ/perimiter network

Setting a standardised baseline of security for all your servers is known as?

Server hardening

Name 2 major disadvantages of WEP

1. performance is degraded by 30%


2. WEP uses a 10bit character key to encrypt the network

What is the benefit of Microsoft providing updates for their Operating Systems and applications?

It closes security vulnerabilities

What does CIA stand for?

Confidentiality Integrity Availability

What are the four steps of hacking?

Foot printing, Scanning, Enumeration, Exploitation

What is a Honeypot?

A honeypot is a system that is designed to look weak or like too good of an opportunity to miss to see attack patterns and/or trap hackers. Usually have minimal security and is located on the perimiter network.

Laptops are more suceptible to ______ than desktops

Theft

What does VPN stand for?

Virtual Private Network

What is the first thing you do when performing a security audit?

Check the companies technology assets

Encrypting a file.....

Scrambles plain text into something unreadable so when it is intercepted it cannot be read

RADIUS stands for?

Remote Authentication Dial-In User Service

HTTPS works with HTTP an _______ to provide encrypted communication

SSL(secure socket layer)/TLS(transport layer security)

What is the strongest form of security for wireless networks?

WPA Enterprise

Kerberos protects against _______

Eavesdropping and reply attacks