Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
What does an A Record do on a DNS server?
|
An A record resolves a host name to an IP address.
|
|
A user creates a secure HTTPS session with a server using a web browser. How is a symmetric key transferred over the Internet with using SSL?
|
The symmetric key is encrypted with a server's public key and then sent over the internet in encrypted form.
|
|
What are the 2 goals for Bell -Lapadula model?
|
1. Primary goal of ensuring confidentially
2. No read up, No write downs |
|
What is SELiniux?
|
Security Enhanced Linux.
This is a non-DAC server. |
|
What is FRR what can it do?
|
False Reject Rate (also called type 1) refers to the percentage of times that a biometric system falsely rejects a known user and instead indicates that the use is unknown.
|
|
What is the primary purpose of a digital signature?
|
The primary purpose of a digital signature is authentication of the sender. It also provides nonrepudiation and integrity but it is not the primary purpose.
|
|
Of the following choices, what is not an example of a detective control?
A) Audit Logs B) Employee background checks C) Intrusion detection system D) Forensics analysis |
B is correct.
An employee background check is a preventive control, not a detective control. |
|
Which one of the following is a one-time password?
A) A synchronous token B) An asynchronous token C) A kerberos ticket granting ticket D) A Chinese wall |
A is correct.
Token-based authentication uses a synchronous token where the user is able to enter a PIN, or password that is also synchronized with a server. |
|
What does a SHA-1 hashing algorithm create?
|
It creates a 160-bit hash.
|
|
What is the most common method of malware delivery?
|
The most common method of delivering malware is via attachments in spam email.
|
|
An anomaly-based intrusion detection system attempts to do what?
|
It tries to document normal behavior in the form of a baseline. If the normal behavior is modified by changing the environment, the baseline must be updated.
|
|
A failover cluster provides what?
|
It provides fault tolerance for one or more servers.
|
|
A white box test is also called what?
|
A Full knowledge test. The testers have full access to the internal network and know the network infrastructure.
|
|
What is a Network Topography?
|
A physical layout of a network
|
|
Name 4 protocols that use IDs and not ports. Also the number for the IDs.
|
1. ICMP 01
2. IGMP 02 3. TCP 06 4. UDP 17 |
|
Name 2 secure protocols
|
1. SSH
2. IPSec |
|
IPv6 address uses how many bits?
|
128 bits / 32 hex / 8 groups
|
|
What is the range for Registered Ports?
|
1024 - 49,151
|
|
IMAP4 users what port?
|
143
|
|
Name 4 Hashing Algorithms
|
1. MD5
2. SHA-1 3. SHA-2 4. SHA-3 |
|
Explain about BIBA model
|
1. Enforces integrity
2. No read down, No write up |
|
Explain about Clark-Wilson model
|
Enforces the principle of Separation of duties
|
|
What are the 2 modes of NAT?
|
1. Static : One-to-one mapping
2. Dynamic: one-to-many mapping |
|
Name the 4 major Threat assessment components.
|
1. Mechanism
2. Probability 3. Impact 4. Type |
|
IKEA algorithm is used for what and how long are the bits?
|
1. IKEA algorithm is used in PGP
2. 128 bits long |