keywords:
Bookmark and Share



Front Back
Access Control includes.....
MAC

DAC

RBAC
Determining the IDENTITY of the account attempting access to resources is

Authentication
CHAP involves the exchange of
hashed values for authentication.
Kerberos v5 supports mutual
authentication
The most common form of authentication is
username and password
DoS and DDos involve the __________________ of normal network services.
disruption
Name 4 or 5 of the different types of DoS and DDoS attacks.
1. Smurf         2. Fraggle
3. Ping flood    4. SYN flood
5. Land           6. Teardrop
7. Bonk           8. Boink
The process of making data look as if it came from somewhere other that its origin is called?
Spoofing
This attack involves the reposting of captured data.
Replay attack
TCP/IP hijacking involves ________ ________ of a TCP/IP session.
taking control
Name all 5 of the different types of malicious code
Viruses
Trojan Horses
Logic Bombs
Worms
Java & ActiveX controls
VPN connections use
PPTP or L2TP protocols
SSH is a secure replacement for
Telnet
eMail can be secured using either of these two protocols
PGP or S/MIME
Web connectivity can be secured using
HTTPS, SSL, and TLS
Vulnerabilities while browsing the web include?
ActiveX controls
CGI vulnerabilities
Cookies
Java and JavaScript
SMTP relay vulnerabilities
A site survey is necessary before
deploying a WLAN.
Name the different firewall technologies
Packet-filtering
Proxy service
Stateful-inspection
Switches segment ___________ networks.
broadcast
Wireless devices provide __________-based connectivity.
broadcast
A bastion host is a
A VLAN allows for computers to be on the same physical segment  to be on different logical segments (True / False)
True
_ _ _ devices translate traffic between public and private address schemes.
NAT
T____________ is the process of transmitting ENCAPSULATED within a second protocol to proeven direct e_____________ using a packet sniffer
Tunneling

eavesdropping
A _________ algorithm uses a mathematical formula to verify
_ _ _ _ integrity
mathematical

data
Cryptographic encryption improves ________________
confidentiality
_ _ _ _ _ _ _ signatures are used to sign data so that the recipient can verify the data's origin.
Digital
What is a DRP and what does it mean?
Disaster Recovery Plan
It details the considerations for backup and restoration, risk assessments, Service-Level Agreements w/vendors and suppliers.
Risk identification includes
1. asset identification
2. risk assessment
3. threat identification & classification
4. identification of vulnerabilities
Computer forensic analysis includes the need to
establish a clear chain of custody, properly collect the evidence and perform investigation, document actions/findings, preserve evidence & documentation, prepare for expert testimony if necessary.
x of y cards