• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
What is the limitations for IPSec Transport mode?
1. Only Payload is encrypted
2. The IP header is NOT encrypted
3. Transport mode can be used Internally
Name 4 early authentication protocols
1. PAP
2. CHAP (nonce is used)
3. MS-CHAP v1
4. MS-CHAP v2
What can EAP do?
This authentication protocol can combine with other protocols like EAP-TLS.
What is nonce?
A number used once
What type of encryption is RSA?
Asymmetric encryption
Name 3 SSOs.
1. Keberos
2. SESAME
3. Krypoknight
What is EC2?
Amazon Elastic Compute Cloud services
What is CRL?
Certification Revocation List
What is TCPWrappers?
A security tool for Host Based IDS
What is PING of Death?
Sending ICMP Packets greater than 64KB
What is Audit Trail?
A chronology sorted record of all the actives on a system.
What is Bluejacking?
Sending business cards via Bluetooth
ICMP is used with many DOS attacks. What should be done to help mitigate this threat?
ICMP traffic should be blocked on the FW.
What is PSK?
Pre-shared key
Kerberos systems uses 2 servers. What are they?
1. Authentication Server
2. Ticket Granting Server
Name 5 Network wireless Protocols
1. WEP
2. WPA personal
3. WPA Enterprise
4. WPA2 personal
5. WPA2 Enterprise
What is OTP?
One-time password
What is PDU?
Protocol Data Unit
> Level 4 Transport of the OSI model
The ability to adjust access control to the exact amount of permissions necessary is called what?
Granularity
What is "Total Risk"?
The combined risk of all the organization's assets, including all the threats and vulnerabilities.
Is Zombie a system?
YES
The backups done on other days backup only the data that has changed since the last full backup. This is called what?
Differential
Name 3 NT audit events.
1. Log on and Log off
2. Security Policy change
3. Use of user rights
SHA has what bit signature?
160 bit signature
In order to use L0pht, the _________ must be exported from windows NT.
SAM - Security Accounts Manager