• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
What does an A Record do on a DNS server?
An A record resolves a host name to an IP address.
A user creates a secure HTTPS session with a server using a web browser. How is a symmetric key transferred over the Internet with using SSL?
The symmetric key is encrypted with a server's public key and then sent over the internet in encrypted form.
What are the 2 goals for Bell -Lapadula model?
1. Primary goal of ensuring confidentially
2. No read up, No write downs
What is SELiniux?
Security Enhanced Linux.
This is a non-DAC server.
What is FRR what can it do?
False Reject Rate (also called type 1) refers to the percentage of times that a biometric system falsely rejects a known user and instead indicates that the use is unknown.
What is the primary purpose of a digital signature?
The primary purpose of a digital signature is authentication of the sender. It also provides nonrepudiation and integrity but it is not the primary purpose.
Of the following choices, what is not an example of a detective control?
A) Audit Logs
B) Employee background checks
C) Intrusion detection system
D) Forensics analysis
B is correct.
An employee background check is a preventive control, not a detective control.
Which one of the following is a one-time password?
A) A synchronous token
B) An asynchronous token
C) A kerberos ticket granting ticket
D) A Chinese wall
A is correct.
Token-based authentication uses a synchronous token where the user is able to enter a PIN, or password that is also synchronized with a server.
What does a SHA-1 hashing algorithm create?
It creates a 160-bit hash.
What is the most common method of malware delivery?
The most common method of delivering malware is via attachments in spam email.
An anomaly-based intrusion detection system attempts to do what?
It tries to document normal behavior in the form of a baseline. If the normal behavior is modified by changing the environment, the baseline must be updated.
A failover cluster provides what?
It provides fault tolerance for one or more servers.
A white box test is also called what?
A Full knowledge test. The testers have full access to the internal network and know the network infrastructure.
What is a Network Topography?
A physical layout of a network
Name 4 protocols that use IDs and not ports. Also the number for the IDs.
1. ICMP 01
2. IGMP 02
3. TCP 06
4. UDP 17
Name 2 secure protocols
1. SSH
2. IPSec
IPv6 address uses how many bits?
128 bits / 32 hex / 8 groups
What is the range for Registered Ports?
1024 - 49,151
IMAP4 users what port?
143
Name 4 Hashing Algorithms
1. MD5
2. SHA-1
3. SHA-2
4. SHA-3
Explain about BIBA model
1. Enforces integrity
2. No read down, No write up
Explain about Clark-Wilson model
Enforces the principle of Separation of duties
What are the 2 modes of NAT?
1. Static : One-to-one mapping
2. Dynamic: one-to-many mapping
Name the 4 major Threat assessment components.
1. Mechanism
2. Probability
3. Impact
4. Type
IKEA algorithm is used for what and how long are the bits?
1. IKEA algorithm is used in PGP
2. 128 bits long