Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
What is the limitations for IPSec Transport mode?
|
1. Only Payload is encrypted
2. The IP header is NOT encrypted 3. Transport mode can be used Internally |
|
Name 4 early authentication protocols
|
1. PAP
2. CHAP (nonce is used) 3. MS-CHAP v1 4. MS-CHAP v2 |
|
What can EAP do?
|
This authentication protocol can combine with other protocols like EAP-TLS.
|
|
What is nonce?
|
A number used once
|
|
What type of encryption is RSA?
|
Asymmetric encryption
|
|
Name 3 SSOs.
|
1. Keberos
2. SESAME 3. Krypoknight |
|
What is EC2?
|
Amazon Elastic Compute Cloud services
|
|
What is CRL?
|
Certification Revocation List
|
|
What is TCPWrappers?
|
A security tool for Host Based IDS
|
|
What is PING of Death?
|
Sending ICMP Packets greater than 64KB
|
|
What is Audit Trail?
|
A chronology sorted record of all the actives on a system.
|
|
What is Bluejacking?
|
Sending business cards via Bluetooth
|
|
ICMP is used with many DOS attacks. What should be done to help mitigate this threat?
|
ICMP traffic should be blocked on the FW.
|
|
What is PSK?
|
Pre-shared key
|
|
Kerberos systems uses 2 servers. What are they?
|
1. Authentication Server
2. Ticket Granting Server |
|
Name 5 Network wireless Protocols
|
1. WEP
2. WPA personal 3. WPA Enterprise 4. WPA2 personal 5. WPA2 Enterprise |
|
What is OTP?
|
One-time password
|
|
What is PDU?
|
Protocol Data Unit
> Level 4 Transport of the OSI model |
|
The ability to adjust access control to the exact amount of permissions necessary is called what?
|
Granularity
|
|
What is "Total Risk"?
|
The combined risk of all the organization's assets, including all the threats and vulnerabilities.
|
|
Is Zombie a system?
|
YES
|
|
The backups done on other days backup only the data that has changed since the last full backup. This is called what?
|
Differential
|
|
Name 3 NT audit events.
|
1. Log on and Log off
2. Security Policy change 3. Use of user rights |
|
SHA has what bit signature?
|
160 bit signature
|
|
In order to use L0pht, the _________ must be exported from windows NT.
|
SAM - Security Accounts Manager
|