• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which is the strongest implementation class of WTLS?

Class 3 - client and server

What is the default port used by HTTPS?

443

What is Internet Security Association and Key Management Protocol (ISAKMP)?

A method for implementing a key exchange protocol and for negotiating a security policy

What is CMP?

This protocol defines the messages and operations required to provide certificate management services


Certificates that should no longer be used due to compromise should be

Revoked

What is PKCS?

A group of standards used in implementing a public key infrastructure

SSL provides secure connections for web transfers using encryption.

True

What are the documents developed by the government to aid in the development of a standard for use in areas such as security or system interoperability?

FIPS, Federal Information Processing Standards

What is Wired Equivalent Privacy (WEP)?

A method that is used to encrypt wireless communications in an 802.11 environment


What is XKMS?

A Key Management Specification that defines services to manage PKI operations within the Extensible Markup Language (XML) environment

What is PKIX?

A group of the standards used in implementing a public key infrastructure


Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.

False

An attack that takes advantage of bugs or weaknesses in the software is referred to as what?

Software exploitation

In a _______________ attack, the attacker observes all traffic before relaying it and can actually modify or block traffic.

man-in-the-middle

What is the automated downloading of malware that takes advantage of a browsers' ability to download different files that compose a web page called?

Drive-by download

What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

War-dialing

An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a ___________ attack.

replay

What is it called when a person registers a domain name, relinquishes it in less than five days, and then gets the same name again, repeating this cycle over and over again?

DNS kiting

The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following?

War-driving

In a ___________ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.

smurf